General

  • Target

    6ceb2d9a052e93d24796de4052eb7cfa.exe

  • Size

    658KB

  • Sample

    221001-jgd2gsffd5

  • MD5

    6ceb2d9a052e93d24796de4052eb7cfa

  • SHA1

    d85c5f925531e95f9e433a2e5c188f4be02daff4

  • SHA256

    0c54fd3a046b8cc613dbb2d9bf898855062ff126e1a68b50115e19ea46da8779

  • SHA512

    47ab8f952295adef7b0de17007fd2922af9015aa11e9d4b4b9a34c9901e85169d8ad43797261090383aab4024dd981a7d9d81e07e32de98e29a0565f9c666d8c

  • SSDEEP

    12288:JHokkGoYMr0FIqAegqJwBws2d6GV89MA2YO:6PGoYgqiw58DyvYO

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.161/donstan/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6ceb2d9a052e93d24796de4052eb7cfa.exe

    • Size

      658KB

    • MD5

      6ceb2d9a052e93d24796de4052eb7cfa

    • SHA1

      d85c5f925531e95f9e433a2e5c188f4be02daff4

    • SHA256

      0c54fd3a046b8cc613dbb2d9bf898855062ff126e1a68b50115e19ea46da8779

    • SHA512

      47ab8f952295adef7b0de17007fd2922af9015aa11e9d4b4b9a34c9901e85169d8ad43797261090383aab4024dd981a7d9d81e07e32de98e29a0565f9c666d8c

    • SSDEEP

      12288:JHokkGoYMr0FIqAegqJwBws2d6GV89MA2YO:6PGoYgqiw58DyvYO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks