General

  • Target

    66a405b3f8cebd4a1ec45f8cf0d27b76.exe

  • Size

    752KB

  • Sample

    221125-wh19mage7y

  • MD5

    66a405b3f8cebd4a1ec45f8cf0d27b76

  • SHA1

    d35831f58b42a207e87dcedf4febf7be2d6a0a29

  • SHA256

    036d2934741edd1cfac3d1addda35e808ac96b41612e51f504e31113ab249ef3

  • SHA512

    48662f5392e267cc41d2862936de9aa6f4b9147c03c802771e1147b0d32b4e713f206451d14743591d660331eb2d5993438ab35ba3b899647ebf09e00d705b29

  • SSDEEP

    12288:MbmZJbxpDFbr+UX7jk2odTcQUCfLTBzaSJsUMUHe0ghHNjZzGbaXj23Y46nejSC:MbMo2odUCjT3VLHveZWaXjbDlC

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      66a405b3f8cebd4a1ec45f8cf0d27b76.exe

    • Size

      752KB

    • MD5

      66a405b3f8cebd4a1ec45f8cf0d27b76

    • SHA1

      d35831f58b42a207e87dcedf4febf7be2d6a0a29

    • SHA256

      036d2934741edd1cfac3d1addda35e808ac96b41612e51f504e31113ab249ef3

    • SHA512

      48662f5392e267cc41d2862936de9aa6f4b9147c03c802771e1147b0d32b4e713f206451d14743591d660331eb2d5993438ab35ba3b899647ebf09e00d705b29

    • SSDEEP

      12288:MbmZJbxpDFbr+UX7jk2odTcQUCfLTBzaSJsUMUHe0ghHNjZzGbaXj23Y46nejSC:MbMo2odUCjT3VLHveZWaXjbDlC

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks