General

  • Target

    DOC#002109800.exe

  • Size

    616KB

  • Sample

    230119-b34v2agb5s

  • MD5

    096056abead49e651f6738e588a8dccc

  • SHA1

    762033f2de1f4a7284f40d3dcbaedee99377a0d4

  • SHA256

    3134e7305cd18c05408e5e1129598ad7d9344d959c7f6717a35cb70da76671f9

  • SHA512

    ac5f46ec049036653866b48cf2ba9e66a4c88d806bd43d541be388a9f68faf3ef093a8b1f9117c8ac5ccf2ebb50d108960c920e97f1deb3135020a85596ceee0

  • SSDEEP

    12288:OtLmnu0b+NoexY/+BO7HAuCmHPL3bQyKRXxEO5VkZzLTlv:om3+NNx84RmHP4bXxEO5VkZPTl

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/prime2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DOC#002109800.exe

    • Size

      616KB

    • MD5

      096056abead49e651f6738e588a8dccc

    • SHA1

      762033f2de1f4a7284f40d3dcbaedee99377a0d4

    • SHA256

      3134e7305cd18c05408e5e1129598ad7d9344d959c7f6717a35cb70da76671f9

    • SHA512

      ac5f46ec049036653866b48cf2ba9e66a4c88d806bd43d541be388a9f68faf3ef093a8b1f9117c8ac5ccf2ebb50d108960c920e97f1deb3135020a85596ceee0

    • SSDEEP

      12288:OtLmnu0b+NoexY/+BO7HAuCmHPL3bQyKRXxEO5VkZzLTlv:om3+NNx84RmHP4bXxEO5VkZPTl

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks