General

  • Target

    docs-5637774002553092534-7272822.rar

  • Size

    362KB

  • Sample

    221201-jtwgasha84

  • MD5

    c8b4eb949b2854251a7f45d7744726a7

  • SHA1

    adf2780b690470219d3c2b60e92564fdd2b5f136

  • SHA256

    90c262a8ed7a49edbc18891ec82e1c0344fafb6c5c48f0e710f20a47936da9d3

  • SHA512

    0ba35305441baec080d47204813c1269131e1480a1c36226c30e554eb8a41e14845ff553541aaa75bad950d994203d25ce7ef020bcec846219094b9d5d691120

  • SSDEEP

    6144:2vKMa9hHm5gZp0rQOk8xORfbitDdfD4Sf7MRP09jx0tyo7W5pS2Dtx2sFd5fo0:2iHHmaZpkkkOdkDmSfgRM99fz5b/5w0

Malware Config

Extracted

Family

lokibot

C2

http://binatbless.me/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      docs-5637774002553092534-7272822.exe

    • Size

      492KB

    • MD5

      eb0364fd92c4d27b41e49d3918d414b1

    • SHA1

      b604eb4789bd591c940b4e193dc2f543a55cc422

    • SHA256

      49a81050cab889308811a7f2f471ea7930784bf8e5db126a3affb0bb21aa98b8

    • SHA512

      8c4ec403b8aa7cb824e2af74dbe0b57cabd4c593698a836b757d9aee6a7f19e7fdeec50438e0f3c5b1187e761e4436359d49e3837e96951f726e469d62458ec7

    • SSDEEP

      12288:XBtqaku/e0MPn8bO+c8gvDjY9rq/uAz/fp:XXqMe0MPngyLjy2/uA

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks