General

  • Target

    4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89

  • Size

    386KB

  • Sample

    230104-axxn4add48

  • MD5

    6ebb467dc49dbb2b90517da19cfb6c16

  • SHA1

    0c3af6a618a75e73920c9872e50286eb987d6e79

  • SHA256

    4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89

  • SHA512

    3da116117767398befbd862294fbea6bb4d15eb21d8d6072722c8b7d80488b3f2668d3026d2d16bed9d669298b5c6e14c1d23f257729d50d6bd79931c2743637

  • SSDEEP

    12288:1Y4UOpgCsQQjEyTpK/ucJKXH8HvuvJq4JI:1YF8gCbUQ/ucJKXXJq4JI

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89

    • Size

      386KB

    • MD5

      6ebb467dc49dbb2b90517da19cfb6c16

    • SHA1

      0c3af6a618a75e73920c9872e50286eb987d6e79

    • SHA256

      4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89

    • SHA512

      3da116117767398befbd862294fbea6bb4d15eb21d8d6072722c8b7d80488b3f2668d3026d2d16bed9d669298b5c6e14c1d23f257729d50d6bd79931c2743637

    • SSDEEP

      12288:1Y4UOpgCsQQjEyTpK/ucJKXH8HvuvJq4JI:1YF8gCbUQ/ucJKXXJq4JI

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks