General

  • Target

    e97a69d2f4292cdef29d0be20c97a18a9ab2a9f342968090c1693a59d8861f28

  • Size

    934KB

  • Sample

    220707-tf9f4scah8

  • MD5

    4564e54eb2e92fb06e46c77ad408469c

  • SHA1

    ad334e5fb885faa1c730b9a2d9dec3c0534762d0

  • SHA256

    e97a69d2f4292cdef29d0be20c97a18a9ab2a9f342968090c1693a59d8861f28

  • SHA512

    9ba57ddae344b6a5406dbedac00307e4a0cc45f59933d574408264ea166a19d7b5041b1f649e72ed97b22713b52f222cc14a1a6b648a8fca0c9d0d369499e3c6

Malware Config

Extracted

Family

lokibot

C2

http://185.29.11.115/oki/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e97a69d2f4292cdef29d0be20c97a18a9ab2a9f342968090c1693a59d8861f28

    • Size

      934KB

    • MD5

      4564e54eb2e92fb06e46c77ad408469c

    • SHA1

      ad334e5fb885faa1c730b9a2d9dec3c0534762d0

    • SHA256

      e97a69d2f4292cdef29d0be20c97a18a9ab2a9f342968090c1693a59d8861f28

    • SHA512

      9ba57ddae344b6a5406dbedac00307e4a0cc45f59933d574408264ea166a19d7b5041b1f649e72ed97b22713b52f222cc14a1a6b648a8fca0c9d0d369499e3c6

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks