General

  • Target

    5e2e90441f42aa3ef20befc9653739dbaec81f19f3e384da2635259ee16a4537

  • Size

    1.2MB

  • Sample

    221125-l1lxjshc86

  • MD5

    64977408740c2d44e46fdaccbf9c9a6e

  • SHA1

    caa2f3251d4ba3b8a424c78089e7cb5c13578693

  • SHA256

    5e2e90441f42aa3ef20befc9653739dbaec81f19f3e384da2635259ee16a4537

  • SHA512

    c2bfdd904fb3da71981ef1419759c1b4a1a0cf4c902efa548a8ea400907f2b754217bfe6ddd8fc7200e1deabad01f63eb1e9822c60ee6dfcdf292e4bd36ef82c

  • SSDEEP

    3072:NSqDDSAJ2fux2kzjksvWiF9f+qwD6hqzJCoCgLYvEzsCN:9DS+2Wx2kzjSOX66gJCoCHE4CN

Malware Config

Extracted

Family

lokibot

C2

http://mizunogolfbags.com/img/img/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5e2e90441f42aa3ef20befc9653739dbaec81f19f3e384da2635259ee16a4537

    • Size

      1.2MB

    • MD5

      64977408740c2d44e46fdaccbf9c9a6e

    • SHA1

      caa2f3251d4ba3b8a424c78089e7cb5c13578693

    • SHA256

      5e2e90441f42aa3ef20befc9653739dbaec81f19f3e384da2635259ee16a4537

    • SHA512

      c2bfdd904fb3da71981ef1419759c1b4a1a0cf4c902efa548a8ea400907f2b754217bfe6ddd8fc7200e1deabad01f63eb1e9822c60ee6dfcdf292e4bd36ef82c

    • SSDEEP

      3072:NSqDDSAJ2fux2kzjksvWiF9f+qwD6hqzJCoCgLYvEzsCN:9DS+2Wx2kzjSOX66gJCoCHE4CN

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks