General

  • Target

    csrss.exe

  • Size

    820KB

  • Sample

    221129-n1qlvafd88

  • MD5

    aa6e6f56b59e2f0c00266386a2962103

  • SHA1

    10bea556ef1f4a8957b661c8e80e4a157fac81e1

  • SHA256

    062841c1e780acd00ef44b49f93e2c82189e1411e735c8da63782f8ae6159405

  • SHA512

    beaaed1877915b03577514c006650af75ee382e39eb08c282678d086aadbdbac851ebee226aa301dc59f7e9ead34d0871dc30094126769cccc48ddca9a77cf2a

  • SSDEEP

    12288:W5gqU+5P36xTXLXV2CtWuTwG8hk5AkIW6PDWyA4l1Ddzoa1cfN:OJP23F2CQ93umD2KDdEPf

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.161/gk2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      csrss.exe

    • Size

      820KB

    • MD5

      aa6e6f56b59e2f0c00266386a2962103

    • SHA1

      10bea556ef1f4a8957b661c8e80e4a157fac81e1

    • SHA256

      062841c1e780acd00ef44b49f93e2c82189e1411e735c8da63782f8ae6159405

    • SHA512

      beaaed1877915b03577514c006650af75ee382e39eb08c282678d086aadbdbac851ebee226aa301dc59f7e9ead34d0871dc30094126769cccc48ddca9a77cf2a

    • SSDEEP

      12288:W5gqU+5P36xTXLXV2CtWuTwG8hk5AkIW6PDWyA4l1Ddzoa1cfN:OJP23F2CQ93umD2KDdEPf

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks