General

  • Target

    46a3c07acbea284bf43c0f70f11acc0c171878f44df5586c5d89fc68965e0119

  • Size

    104KB

  • Sample

    220707-j1xypsach9

  • MD5

    bcae12df752ffdd4590405480f52334f

  • SHA1

    62896a72626468a4365c7dc454fca652b24244d9

  • SHA256

    46a3c07acbea284bf43c0f70f11acc0c171878f44df5586c5d89fc68965e0119

  • SHA512

    73f19aed906b6c25046ee2a34b8c456f90bea7f110338750325dfa2004f6070f3de6878a883f76eee005e3dff0a35e7934be5fdb24804f325be8189b66292e5e

Malware Config

Extracted

Family

lokibot

C2

http://jizzy.kenal-cn.com/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      46a3c07acbea284bf43c0f70f11acc0c171878f44df5586c5d89fc68965e0119

    • Size

      104KB

    • MD5

      bcae12df752ffdd4590405480f52334f

    • SHA1

      62896a72626468a4365c7dc454fca652b24244d9

    • SHA256

      46a3c07acbea284bf43c0f70f11acc0c171878f44df5586c5d89fc68965e0119

    • SHA512

      73f19aed906b6c25046ee2a34b8c456f90bea7f110338750325dfa2004f6070f3de6878a883f76eee005e3dff0a35e7934be5fdb24804f325be8189b66292e5e

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks