General

  • Target

    c1342f4370bbfd24f89035782ad0b552b56ff02817cdb5bd7f2c7914af900e6b

  • Size

    954KB

  • Sample

    220725-aklfasfafl

  • MD5

    fbb5dc66f84b2eb87e4fdb625125600b

  • SHA1

    f31d70cd8d8e24f59c1f21d3a2b9ce5b0f119d7f

  • SHA256

    c1342f4370bbfd24f89035782ad0b552b56ff02817cdb5bd7f2c7914af900e6b

  • SHA512

    6dce03584191c4b1c9f2131855a927b9335135f51c128a766745a85137e3dd039e0ab14b54641df77511d6e72a4305fead3d9a0686cf7db078c49e739ffd63d4

Malware Config

Extracted

Family

lokibot

C2

http://musicclubbing.com/vip/ip/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c1342f4370bbfd24f89035782ad0b552b56ff02817cdb5bd7f2c7914af900e6b

    • Size

      954KB

    • MD5

      fbb5dc66f84b2eb87e4fdb625125600b

    • SHA1

      f31d70cd8d8e24f59c1f21d3a2b9ce5b0f119d7f

    • SHA256

      c1342f4370bbfd24f89035782ad0b552b56ff02817cdb5bd7f2c7914af900e6b

    • SHA512

      6dce03584191c4b1c9f2131855a927b9335135f51c128a766745a85137e3dd039e0ab14b54641df77511d6e72a4305fead3d9a0686cf7db078c49e739ffd63d4

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks