General

  • Target

    Reference Image.ace.exe

  • Size

    774KB

  • Sample

    221005-nfzn1sebf6

  • MD5

    e9cf218af0dbaf1f3af0c3956e25cf4b

  • SHA1

    d4a06df8aec6f59bd3c9cbf99e65787bc4cf9d65

  • SHA256

    824dc523519e32a1f6c4101ade887b5464d6f11c5226441fe18dae17e8e34ce9

  • SHA512

    4f325bcfb7643d9b2b4a179684de8ea0c1bdd31a44cb60acf31b6f761d151df5cc44e62689cc0afedda2e997122e6489a1017bb63361140b202d3f54caa40f57

  • SSDEEP

    12288:YR/4vejpuBdbU6382ykQpBjIpuWwoBB4y9zGBr:S4ve2U6382ykGjMuErk

Malware Config

Extracted

Family

lokibot

C2

http://ebelk.us/last/luck/azmxxp.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Reference Image.ace.exe

    • Size

      774KB

    • MD5

      e9cf218af0dbaf1f3af0c3956e25cf4b

    • SHA1

      d4a06df8aec6f59bd3c9cbf99e65787bc4cf9d65

    • SHA256

      824dc523519e32a1f6c4101ade887b5464d6f11c5226441fe18dae17e8e34ce9

    • SHA512

      4f325bcfb7643d9b2b4a179684de8ea0c1bdd31a44cb60acf31b6f761d151df5cc44e62689cc0afedda2e997122e6489a1017bb63361140b202d3f54caa40f57

    • SSDEEP

      12288:YR/4vejpuBdbU6382ykQpBjIpuWwoBB4y9zGBr:S4ve2U6382ykGjMuErk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks