General

  • Target

    file.exe

  • Size

    1017KB

  • Sample

    221123-splkzaeh9v

  • MD5

    72669913006c4a7a187222b83b0c5a56

  • SHA1

    5f540dd0184a3d97bf07e8d11e9e71821a26b132

  • SHA256

    cdf391a25039e52f901e570ec398ee0cda880b9ea1275ebfd2272e51474c4a44

  • SHA512

    f089b7bcfa7fb24e18c6ecaa248b4db4c675c8bd3a7b572e808cbbd663dd20d3ce16c4cd85c8aa76c89d657259b7e14d72764b9ceb6fc1d159f93bc09eededce

  • SSDEEP

    24576:vzbiMgh/aw9RzR5JwC2dQCZFFvH07vQ7T72Dz:vzbiPh/d9F7yC2iC/FCyq

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/gl16/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      file.exe

    • Size

      1017KB

    • MD5

      72669913006c4a7a187222b83b0c5a56

    • SHA1

      5f540dd0184a3d97bf07e8d11e9e71821a26b132

    • SHA256

      cdf391a25039e52f901e570ec398ee0cda880b9ea1275ebfd2272e51474c4a44

    • SHA512

      f089b7bcfa7fb24e18c6ecaa248b4db4c675c8bd3a7b572e808cbbd663dd20d3ce16c4cd85c8aa76c89d657259b7e14d72764b9ceb6fc1d159f93bc09eededce

    • SSDEEP

      24576:vzbiMgh/aw9RzR5JwC2dQCZFFvH07vQ7T72Dz:vzbiPh/d9F7yC2iC/FCyq

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks