General

  • Target

    Product Inquiry.exe

  • Size

    697KB

  • Sample

    220920-wxk6ysebd7

  • MD5

    9386b02948f329122dbbcd33a330db4e

  • SHA1

    19dbc46e6d3a7db51b059d095a4fe8783759d6a8

  • SHA256

    95dd34de2f6e73d6042f299af673d33a26684a26ed42e4bfe24ca71f80cb38c0

  • SHA512

    373ba2c03581737968ded508e2399cea02a1ab8c9dee21c5575cc9130dd5133b0fab5aeb649ab2b2e4668f4922dbedf2ce7502f516e8a79dd77fd3fe18eb4668

  • SSDEEP

    6144:GlkrZZJah/9RI3GyutKeYz1ls0jgyOULjhylTEbcZxkaI6RTAPvgOsUNb50WGcwf:IkrZCFqes/zzAyb0karevvnNbxGcw

Malware Config

Extracted

Family

lokibot

C2

http://162.0.223.13/?loop

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Product Inquiry.exe

    • Size

      697KB

    • MD5

      9386b02948f329122dbbcd33a330db4e

    • SHA1

      19dbc46e6d3a7db51b059d095a4fe8783759d6a8

    • SHA256

      95dd34de2f6e73d6042f299af673d33a26684a26ed42e4bfe24ca71f80cb38c0

    • SHA512

      373ba2c03581737968ded508e2399cea02a1ab8c9dee21c5575cc9130dd5133b0fab5aeb649ab2b2e4668f4922dbedf2ce7502f516e8a79dd77fd3fe18eb4668

    • SSDEEP

      6144:GlkrZZJah/9RI3GyutKeYz1ls0jgyOULjhylTEbcZxkaI6RTAPvgOsUNb50WGcwf:IkrZCFqes/zzAyb0karevvnNbxGcw

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks