General

  • Target

    PDA Query PDA18530131.exe

  • Size

    971KB

  • Sample

    220918-ddaxrsafc3

  • MD5

    26a2cdf0962e2387013c9eeab3a51524

  • SHA1

    2b1b701875506c3f96181e384b78c04b272ba8ad

  • SHA256

    511c38c2255a1e2864fabb597952dc70305f60b6b14228f7ad41226ee31fc4ec

  • SHA512

    0e5074cf06a80611b644f0b63502ee36a297b9dd9bf554ebe1d952a14725482d31f9db4b401fb836eeac0393db14173ed687a6ac825a8cb3e070d20f238fac38

  • SSDEEP

    12288:GH53cCRKRbiXJSybsKLI2mfUVYyWGakEr+UvGgGRT0tlCYcTS1RXXO:o5MCR2uZfQnebxRT0t4NTS19e

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/gk10/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PDA Query PDA18530131.exe

    • Size

      971KB

    • MD5

      26a2cdf0962e2387013c9eeab3a51524

    • SHA1

      2b1b701875506c3f96181e384b78c04b272ba8ad

    • SHA256

      511c38c2255a1e2864fabb597952dc70305f60b6b14228f7ad41226ee31fc4ec

    • SHA512

      0e5074cf06a80611b644f0b63502ee36a297b9dd9bf554ebe1d952a14725482d31f9db4b401fb836eeac0393db14173ed687a6ac825a8cb3e070d20f238fac38

    • SSDEEP

      12288:GH53cCRKRbiXJSybsKLI2mfUVYyWGakEr+UvGgGRT0tlCYcTS1RXXO:o5MCR2uZfQnebxRT0t4NTS19e

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks