General

  • Target

    f7617da4fbafb49c2bc50ac21d222652c0f3d2e2bb796c920f4b926e41439db5

  • Size

    782KB

  • Sample

    220707-lkxdcabccl

  • MD5

    c447ad3b737815ce5a9b3bf4ff5eaf84

  • SHA1

    166c72b9868c4d9cce1da8b4a590ef30621ed827

  • SHA256

    f7617da4fbafb49c2bc50ac21d222652c0f3d2e2bb796c920f4b926e41439db5

  • SHA512

    73150cfce03d09b9df50785477515b91a3eb24a069d58421e1648452edcb821ded9029d185197903c70facb4e396dd14b800cfee030695809a17fae3e53a48cd

Malware Config

Extracted

Family

lokibot

C2

http://hyatqfuh9olahvxf.ga/BN1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f7617da4fbafb49c2bc50ac21d222652c0f3d2e2bb796c920f4b926e41439db5

    • Size

      782KB

    • MD5

      c447ad3b737815ce5a9b3bf4ff5eaf84

    • SHA1

      166c72b9868c4d9cce1da8b4a590ef30621ed827

    • SHA256

      f7617da4fbafb49c2bc50ac21d222652c0f3d2e2bb796c920f4b926e41439db5

    • SHA512

      73150cfce03d09b9df50785477515b91a3eb24a069d58421e1648452edcb821ded9029d185197903c70facb4e396dd14b800cfee030695809a17fae3e53a48cd

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks