General

  • Target

    8db7e3552aec43baa1c4bc27731672bec6a5a1a2099e547177c766362da636fb

  • Size

    445KB

  • Sample

    230111-n6cxyabh93

  • MD5

    cd7097190c4f15497a41ad35eb883af4

  • SHA1

    7c0e91f8a12ff787018b52f4d8785b681df91b04

  • SHA256

    8db7e3552aec43baa1c4bc27731672bec6a5a1a2099e547177c766362da636fb

  • SHA512

    763cb35fdcff4386116673c2a451a40cf87658bbb3b8a20eb0b849b507b13380043cb766ac7c51b9a29bcdebe8d0c4b2c0e4c0088e47c67539361b37bf6458f9

  • SSDEEP

    12288:rYKWpz5vQAyL3gHkBY6LK4tWReJm+8ubkw:uJyjgHCYp4tWIY+bkw

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/gk1/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8db7e3552aec43baa1c4bc27731672bec6a5a1a2099e547177c766362da636fb

    • Size

      445KB

    • MD5

      cd7097190c4f15497a41ad35eb883af4

    • SHA1

      7c0e91f8a12ff787018b52f4d8785b681df91b04

    • SHA256

      8db7e3552aec43baa1c4bc27731672bec6a5a1a2099e547177c766362da636fb

    • SHA512

      763cb35fdcff4386116673c2a451a40cf87658bbb3b8a20eb0b849b507b13380043cb766ac7c51b9a29bcdebe8d0c4b2c0e4c0088e47c67539361b37bf6458f9

    • SSDEEP

      12288:rYKWpz5vQAyL3gHkBY6LK4tWReJm+8ubkw:uJyjgHCYp4tWIY+bkw

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks