General

  • Target

    Purchase Inquiry.rar

  • Size

    498KB

  • Sample

    221004-l83j9sahak

  • MD5

    5a43361ffaf18b5c48d68ab42be14ea3

  • SHA1

    01bae96a8a59f5a0e7f8a8ddf658fa87f2a440a4

  • SHA256

    655ae617bfe291f3c0d70a21ef27b36f3e0c0350b040c98eb6b9e80e0ad2d77e

  • SHA512

    0dde316492ae2530775b0343141a8d1608fbed5d2a76ae21b09ed8545e60104aabcd7064242763a20e0d8b36d16afbf058fa96c327a02f855b495648dfbe0bec

  • SSDEEP

    12288:yexxJ8fjOineWYg5yo/ljSTEjUVHVZlfxa7JWpuEuF71U6:ygxGfCie1g5NJSgjUVHV/fxa7JWYEW7L

Malware Config

Extracted

Family

lokibot

C2

http://162.0.223.13/?zfkdYtHLPzjU8NYmyvhLkN8G1QZuI5Khl4vjyc5nMohVcgiLLAw5oEMpvMUd

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DHL Express Receipt.exe

    • Size

      953KB

    • MD5

      99ebc46c20777bc409ac3b071e572ddf

    • SHA1

      aff3e22b95adce58fd677f55416f48c31b66fef1

    • SHA256

      a2c8da15bb671e4122238011b32c056de465a37ac51b4a5859f89d0c55f8c838

    • SHA512

      b1374857601ca7142edd4d1a8d1562bd49ebd05bfc64b74f72e1afeb7d7b0f3ced7dafe911020b3a674b1e5a5307392998df598968248531f2fdc7d7654f2854

    • SSDEEP

      12288:6K6K4HTNMA2fEngLtEuQA8a+cgLBaJ5wx:6t2fE+to1cg8J5wx

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks