General

  • Target

    ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd.zip

  • Size

    191KB

  • Sample

    221001-l84gkafgg5

  • MD5

    16ba38408ee006f7792d942df357e588

  • SHA1

    9c7e7be6b1f16b81a4dc66c636e684ad512dc459

  • SHA256

    a07c65637bff22e30c394682fdadacbdfc252d8a48abf2ac69f7e5d21cec6c40

  • SHA512

    70be93645d00970d569a541bac70ce73162e152046d0b2b828ff812f27aa324734f84bf38c519275fdb6eb8e222a5afebbc28501ae256decf08d4771d3a54718

  • SSDEEP

    3072:hIJxihmGHkctGU23LlCTUHbRRXdYdhg+nYyYMKUYa+lfSPuW54YIcGp6MR20BvA3:hswdlGU25C+bPKdhgyYyVKUYTlfS1D1R

Malware Config

Extracted

Family

lokibot

C2

http://ipvhosted.duckdns.org:6060/hosted/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd.exe

    • Size

      213KB

    • MD5

      cb5a734b40ca605caf417cf725a73d7e

    • SHA1

      1f64186091fba7390338001ed37a8bd7b4778f08

    • SHA256

      ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd

    • SHA512

      e5af26105a62cbb761621547376fc96143bf6d6762dff805e62b8c30c7ee1e01d55177c3ca42592d92a058dc89e0e56f58061d29f42757026bb05434363719fe

    • SSDEEP

      3072:WwJ52Y7ZoH5XJaVFJwayPiMuPmfmqflNd7oF3/BSlPLL4sO9Jpgj+UzkpnujbP4i:WwHysLJwrbBvlNCwPLL1O9GkpuntZ3

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks