General

  • Target

    e571636d6206e594eb73fa862c09377e565c9ad4c221ea65cdd31766b806164e

  • Size

    598KB

  • Sample

    221125-bmp2yabf76

  • MD5

    336fbf99a320a1192e848adc3afed9bf

  • SHA1

    0521327b1ed8cc65bb23b33f3c4319f1a37c0b18

  • SHA256

    e571636d6206e594eb73fa862c09377e565c9ad4c221ea65cdd31766b806164e

  • SHA512

    4e7f74a9f81f9819243c9650dac2218dee17474e6dd859b8c327ce19ac43c6cca59ecf980854d09b341e6f2393b9120cebcd366b82eb9b8804a76b837bbc7530

  • SSDEEP

    12288:6cg4GRo5Z7BhFvjUsdcQ929Y8M3jSCGmZJbxpDF:5gnCD7BnU09yMmCG

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.148/victor/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e571636d6206e594eb73fa862c09377e565c9ad4c221ea65cdd31766b806164e

    • Size

      598KB

    • MD5

      336fbf99a320a1192e848adc3afed9bf

    • SHA1

      0521327b1ed8cc65bb23b33f3c4319f1a37c0b18

    • SHA256

      e571636d6206e594eb73fa862c09377e565c9ad4c221ea65cdd31766b806164e

    • SHA512

      4e7f74a9f81f9819243c9650dac2218dee17474e6dd859b8c327ce19ac43c6cca59ecf980854d09b341e6f2393b9120cebcd366b82eb9b8804a76b837bbc7530

    • SSDEEP

      12288:6cg4GRo5Z7BhFvjUsdcQ929Y8M3jSCGmZJbxpDF:5gnCD7BnU09yMmCG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks