General

  • Target

    DHL Receipt_12248117733.exe

  • Size

    598KB

  • Sample

    221125-h8dz5aag56

  • MD5

    65148d45ed3524c0ed933c751f5d3477

  • SHA1

    270aecb89bdbb0838d8813cb6e5acf21422b6784

  • SHA256

    f913eb912b50c2fed862a810f05dcb7f8b3ad09e614d6ec8dc76e1617815c005

  • SHA512

    f80f8b411f9a1f525654c35907d8934222cdcf46d7f960c590b25727bfa4278684fd21b28131a0cdcd1d78e3b1c3b136409df923509f96fd0fec822e03b43c4b

  • SSDEEP

    12288:ccOW+MQbAAZN6hbh3M7o2jSC2mZJbxpDF:3b+ZN6Rh3MIC2

Malware Config

Extracted

Family

lokibot

C2

http://157.245.36.27/~dokterpol/?page=1806710989428

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DHL Receipt_12248117733.exe

    • Size

      598KB

    • MD5

      65148d45ed3524c0ed933c751f5d3477

    • SHA1

      270aecb89bdbb0838d8813cb6e5acf21422b6784

    • SHA256

      f913eb912b50c2fed862a810f05dcb7f8b3ad09e614d6ec8dc76e1617815c005

    • SHA512

      f80f8b411f9a1f525654c35907d8934222cdcf46d7f960c590b25727bfa4278684fd21b28131a0cdcd1d78e3b1c3b136409df923509f96fd0fec822e03b43c4b

    • SSDEEP

      12288:ccOW+MQbAAZN6hbh3M7o2jSC2mZJbxpDF:3b+ZN6Rh3MIC2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks