General

  • Target

    adc6a50e5985c31f0ed5ea885edd73e787f893f709591e5cf795fd78403d1430

  • Size

    354KB

  • Sample

    230119-jqlspafd76

  • MD5

    58dbd12561b26a53ecf30b37a0c4060d

  • SHA1

    3e1c7d108c4d672b2bf226727485a163a8fa70a9

  • SHA256

    adc6a50e5985c31f0ed5ea885edd73e787f893f709591e5cf795fd78403d1430

  • SHA512

    d83112639e95ea70a98dadb4d6875536380c45baec9d6b4dd00dd0b7d9dee8a1e68611fdd43820d5f0cca9591a47a2e5fa7d0f56e5b4d80d286f37e0d311d92d

  • SSDEEP

    6144:AYa6qmngd6pKEHki5EtBR0cKIM+oyVKFzqQPtglr6y3WUSIQxlBzQJ:AYbgd63Ei5EtYcKIM+Xk3gQy3rSIQV0

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      adc6a50e5985c31f0ed5ea885edd73e787f893f709591e5cf795fd78403d1430

    • Size

      354KB

    • MD5

      58dbd12561b26a53ecf30b37a0c4060d

    • SHA1

      3e1c7d108c4d672b2bf226727485a163a8fa70a9

    • SHA256

      adc6a50e5985c31f0ed5ea885edd73e787f893f709591e5cf795fd78403d1430

    • SHA512

      d83112639e95ea70a98dadb4d6875536380c45baec9d6b4dd00dd0b7d9dee8a1e68611fdd43820d5f0cca9591a47a2e5fa7d0f56e5b4d80d286f37e0d311d92d

    • SSDEEP

      6144:AYa6qmngd6pKEHki5EtBR0cKIM+oyVKFzqQPtglr6y3WUSIQxlBzQJ:AYbgd63Ei5EtYcKIM+Xk3gQy3rSIQV0

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks