General

  • Target

    f695be10d46729f7034a02e8b7f4a34bfbb36ba8f5293efa74174d7b1e681bdb

  • Size

    864KB

  • Sample

    221006-e9kyaagfbl

  • MD5

    4d212e3e1376174e71c8ee325d601461

  • SHA1

    48f55d62e0b830e5c3bafea256b5cecd8b0a7a5a

  • SHA256

    f695be10d46729f7034a02e8b7f4a34bfbb36ba8f5293efa74174d7b1e681bdb

  • SHA512

    7c1802a294aa3b5f92995c933eeb9187b9cf2ee6583242f6abe9001ba68323b6e285be1bb8a4ce22f0f8c295aa98f385ad899608ccd885df6a8515a23253cac3

  • SSDEEP

    12288:tHUezRNIaw8Vt56IwVpe8skPylGpeIPieqVdWQ+5jdefH2fTxu4ve:248ctoIlkPylAPPAn+5jdasxu4ve

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.162/smart/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f695be10d46729f7034a02e8b7f4a34bfbb36ba8f5293efa74174d7b1e681bdb

    • Size

      864KB

    • MD5

      4d212e3e1376174e71c8ee325d601461

    • SHA1

      48f55d62e0b830e5c3bafea256b5cecd8b0a7a5a

    • SHA256

      f695be10d46729f7034a02e8b7f4a34bfbb36ba8f5293efa74174d7b1e681bdb

    • SHA512

      7c1802a294aa3b5f92995c933eeb9187b9cf2ee6583242f6abe9001ba68323b6e285be1bb8a4ce22f0f8c295aa98f385ad899608ccd885df6a8515a23253cac3

    • SSDEEP

      12288:tHUezRNIaw8Vt56IwVpe8skPylGpeIPieqVdWQ+5jdefH2fTxu4ve:248ctoIlkPylAPPAn+5jdasxu4ve

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks