General

  • Target

    DHL Receipt.exe

  • Size

    901KB

  • Sample

    220926-c3k9cshae6

  • MD5

    4c743f027a2c730fb9d2ddc1c8d56327

  • SHA1

    7017a737674cc5eaeaffe90c8df1fda151992259

  • SHA256

    9fd17bb86920c52db8ddcbd18efb3725f5570db182676fa678756cc3d3e11c9d

  • SHA512

    f844f2757bf929d240402f72c322b88be9690e8b27089ca0a83e0dc34602136a5ff3afce6d339f5bdbe646a6c7e84d9c5146cb929267c396a6c5fc46af5f5a0c

  • SSDEEP

    12288:e1vdkD7wb2ivkB6nkc5I6c8EKCsL5BBwImZP02iBAXq6yutBnN:kiLqkcuIEhsPcGjBAX2uBn

Malware Config

Extracted

Family

lokibot

C2

http://162.0.223.13/?zfkdYtHLPzjU8NYmyvhLkN8G1QZuI5Khl4vjyc5nMohVcgiLLAw5oEMpvMUd

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DHL Receipt.exe

    • Size

      901KB

    • MD5

      4c743f027a2c730fb9d2ddc1c8d56327

    • SHA1

      7017a737674cc5eaeaffe90c8df1fda151992259

    • SHA256

      9fd17bb86920c52db8ddcbd18efb3725f5570db182676fa678756cc3d3e11c9d

    • SHA512

      f844f2757bf929d240402f72c322b88be9690e8b27089ca0a83e0dc34602136a5ff3afce6d339f5bdbe646a6c7e84d9c5146cb929267c396a6c5fc46af5f5a0c

    • SSDEEP

      12288:e1vdkD7wb2ivkB6nkc5I6c8EKCsL5BBwImZP02iBAXq6yutBnN:kiLqkcuIEhsPcGjBAX2uBn

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks