General

  • Target

    SIPARISI LISTESI_(P.O_402615A)ASTIM ENDSTRI.EXE

  • Size

    152KB

  • Sample

    221026-nkh7tsfehn

  • MD5

    6db316708b877bf1e32360fb7c617184

  • SHA1

    d12f12ced03eaf17b2f30c32337659ca531d0b57

  • SHA256

    e683df34ad78d353f0ad9741604e5e306ec085d3d6c874831eb4ce8cf6d35f70

  • SHA512

    00fc754ad1b4925c6fee61c502bcf8fc40a3645dce08a0352ada6113b1b294037f9a7408742b43f593205802cea9f870afcf00670ee9e4cc777cd8c4f6156e06

  • SSDEEP

    1536:MLWxqhaZjCnx8Q3pRNQoNLjphmQZjF/6w9m0EUmVcl:IWxeMjCx8Q3KWdDjFSwxEU8Y

Malware Config

Extracted

Family

lokibot

C2

https://segoremlolgv.gq/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SIPARISI LISTESI_(P.O_402615A)ASTIM ENDSTRI.EXE

    • Size

      152KB

    • MD5

      6db316708b877bf1e32360fb7c617184

    • SHA1

      d12f12ced03eaf17b2f30c32337659ca531d0b57

    • SHA256

      e683df34ad78d353f0ad9741604e5e306ec085d3d6c874831eb4ce8cf6d35f70

    • SHA512

      00fc754ad1b4925c6fee61c502bcf8fc40a3645dce08a0352ada6113b1b294037f9a7408742b43f593205802cea9f870afcf00670ee9e4cc777cd8c4f6156e06

    • SSDEEP

      1536:MLWxqhaZjCnx8Q3pRNQoNLjphmQZjF/6w9m0EUmVcl:IWxeMjCx8Q3KWdDjFSwxEU8Y

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks