General

  • Target

    44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f

  • Size

    665KB

  • Sample

    220707-v3x72achbq

  • MD5

    abfd38c3dec0cf8032d670c9ac9317bc

  • SHA1

    eddc4812338bb8e1d2b45da8e60242224aa6eada

  • SHA256

    44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f

  • SHA512

    a352f49434760a5fcd9a9fa584a8b2d500f3a4ec95c7ea3358359fe54f72fa650b0c622ae88edd9a56f8e40ec367b3f767883f4c504f5436b7c48c9742fc0068

Malware Config

Extracted

Family

lokibot

C2

https://publicspeaking.co.id/seun/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f

    • Size

      665KB

    • MD5

      abfd38c3dec0cf8032d670c9ac9317bc

    • SHA1

      eddc4812338bb8e1d2b45da8e60242224aa6eada

    • SHA256

      44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f

    • SHA512

      a352f49434760a5fcd9a9fa584a8b2d500f3a4ec95c7ea3358359fe54f72fa650b0c622ae88edd9a56f8e40ec367b3f767883f4c504f5436b7c48c9742fc0068

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks