General

  • Target

    14a98dd64bc14a71437e3447388f174e.exe

  • Size

    582KB

  • Sample

    221103-kq2dtaagbl

  • MD5

    14a98dd64bc14a71437e3447388f174e

  • SHA1

    03e35cc5cc5ef73746e1b24f1ba01ce32b7bf535

  • SHA256

    048c2abc57cd9b772827a1f2ab33e4e85cd5ad98c090c654eb631ed223dc7f5c

  • SHA512

    e1919249e49cc3b2be66f1cbc5ce878389cf4fc0cfe9ad6f03f3959a3885cc4b399942d67d357b7b4975b1e11a9888567baf1d259c808d4979151e0033fbd758

  • SSDEEP

    12288:7C07pPJ2Jp70G0xKl/JRGyz9wwPaSzmdoUDwYBYqG:51kJf0kl/zHPPmWUU4G

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.162/drostov/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      14a98dd64bc14a71437e3447388f174e.exe

    • Size

      582KB

    • MD5

      14a98dd64bc14a71437e3447388f174e

    • SHA1

      03e35cc5cc5ef73746e1b24f1ba01ce32b7bf535

    • SHA256

      048c2abc57cd9b772827a1f2ab33e4e85cd5ad98c090c654eb631ed223dc7f5c

    • SHA512

      e1919249e49cc3b2be66f1cbc5ce878389cf4fc0cfe9ad6f03f3959a3885cc4b399942d67d357b7b4975b1e11a9888567baf1d259c808d4979151e0033fbd758

    • SSDEEP

      12288:7C07pPJ2Jp70G0xKl/JRGyz9wwPaSzmdoUDwYBYqG:51kJf0kl/zHPPmWUU4G

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks