General

  • Target

    b9b8dd22b7c9f62e75991a3b73e17e2c.exe

  • Size

    289KB

  • Sample

    230119-shwgladc5z

  • MD5

    b9b8dd22b7c9f62e75991a3b73e17e2c

  • SHA1

    fa60401daeb0fcb9e4e78d046cf0591275485d40

  • SHA256

    9d1ef7527f27870acabb3066ff486e312887c5f3e34578da8729b2b460c66acd

  • SHA512

    7718cfc1b407343061a1adcdc480b55e91ce2efcbffbadf6a76a4aa4e77611944cf3921b808a16efa1f27410b2be74b457f5932c61ce8235eac5d7f772ce9cb5

  • SSDEEP

    6144:oYa6A0GkCpOZRAHyFgPgd+UjtFsFo14K4:oYW0GkCwZrF0UjtuFoa3

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/cody/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b9b8dd22b7c9f62e75991a3b73e17e2c.exe

    • Size

      289KB

    • MD5

      b9b8dd22b7c9f62e75991a3b73e17e2c

    • SHA1

      fa60401daeb0fcb9e4e78d046cf0591275485d40

    • SHA256

      9d1ef7527f27870acabb3066ff486e312887c5f3e34578da8729b2b460c66acd

    • SHA512

      7718cfc1b407343061a1adcdc480b55e91ce2efcbffbadf6a76a4aa4e77611944cf3921b808a16efa1f27410b2be74b457f5932c61ce8235eac5d7f772ce9cb5

    • SSDEEP

      6144:oYa6A0GkCpOZRAHyFgPgd+UjtFsFo14K4:oYW0GkCwZrF0UjtuFoa3

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks