General

  • Target

    2393a3b4866dc03a2ee2b90e2fb7b9bd.exe

  • Size

    866KB

  • Sample

    220921-kdj9rsbdgl

  • MD5

    2393a3b4866dc03a2ee2b90e2fb7b9bd

  • SHA1

    b356342883708f7033358ac54671a451c65316dd

  • SHA256

    10e93b584478111c22609cfc1db9eee069a0b949f86feea95b7318c511666941

  • SHA512

    4a42c65441ed6d7d2dacae1faa3615a7dc1bd86d21e2a0e117af1b47a75ae9a2197477aae2bc110c672dba92e2a197bd6dceacac15562e82a80202220e01a719

  • SSDEEP

    12288:IWFL7ZWG1eGr9s1mri5UtsZhDy5Sm0Wmtv:IWFfZL17sgriSsu5W1

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/perez/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2393a3b4866dc03a2ee2b90e2fb7b9bd.exe

    • Size

      866KB

    • MD5

      2393a3b4866dc03a2ee2b90e2fb7b9bd

    • SHA1

      b356342883708f7033358ac54671a451c65316dd

    • SHA256

      10e93b584478111c22609cfc1db9eee069a0b949f86feea95b7318c511666941

    • SHA512

      4a42c65441ed6d7d2dacae1faa3615a7dc1bd86d21e2a0e117af1b47a75ae9a2197477aae2bc110c672dba92e2a197bd6dceacac15562e82a80202220e01a719

    • SSDEEP

      12288:IWFL7ZWG1eGr9s1mri5UtsZhDy5Sm0Wmtv:IWFfZL17sgriSsu5W1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks