General

  • Target

    OUTSTANDING INVOICE20222.exe

  • Size

    691KB

  • Sample

    230117-khkq4ada84

  • MD5

    bbcf4c3eb99f83a44a33756f4d60c510

  • SHA1

    451a5e797841a7efd3b6ed5508cdda7f158bc9c3

  • SHA256

    bdf40e1a0b438ef4e304c034b2c10f0226cb710a824a12cada02557b49164654

  • SHA512

    e48a9db5e2461b1dbde60bd21c9a50c927566cee311c2984f3a3efa937b4a1c3f82ab50bd1752892a037c1c0a2ae689a66c7c0a265b4b5d7846a16097c394797

  • SSDEEP

    12288:d2m8Pf2ZlA+wwanu0b2idzV+ngRe2Ai6hWLKmGOGwgNoexY/NTlEc:d2Aewa32irRO/QLowgNNx8NTl5

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/prime1/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      OUTSTANDING INVOICE20222.exe

    • Size

      691KB

    • MD5

      bbcf4c3eb99f83a44a33756f4d60c510

    • SHA1

      451a5e797841a7efd3b6ed5508cdda7f158bc9c3

    • SHA256

      bdf40e1a0b438ef4e304c034b2c10f0226cb710a824a12cada02557b49164654

    • SHA512

      e48a9db5e2461b1dbde60bd21c9a50c927566cee311c2984f3a3efa937b4a1c3f82ab50bd1752892a037c1c0a2ae689a66c7c0a265b4b5d7846a16097c394797

    • SSDEEP

      12288:d2m8Pf2ZlA+wwanu0b2idzV+ngRe2Ai6hWLKmGOGwgNoexY/NTlEc:d2Aewa32irRO/QLowgNNx8NTl5

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks