General

  • Target

    c870c1260c0971b93525669fea8546b46ec996fa8790fae9713f7cb66c83570c

  • Size

    718KB

  • Sample

    230120-rmk1zsbb44

  • MD5

    11b175866c83356e75522ee90be79d4e

  • SHA1

    424a8db6795f1802d231787c86cb6e5ba862a902

  • SHA256

    c870c1260c0971b93525669fea8546b46ec996fa8790fae9713f7cb66c83570c

  • SHA512

    3a2e5aaadbc3e695fd8bb17d621e94e2d7462b3147cc94d04a153ae6247f237a941d82e365b3fb5a4c0ba2ae9cafdad582519bf3a4b3e3fdda49c6cadc999dea

  • SSDEEP

    12288:BgnJV5Wzce8de6akSIYG6fo/Zs1GPchRvilzP:Bgz0cVeBu66EfOP

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/line/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c870c1260c0971b93525669fea8546b46ec996fa8790fae9713f7cb66c83570c

    • Size

      718KB

    • MD5

      11b175866c83356e75522ee90be79d4e

    • SHA1

      424a8db6795f1802d231787c86cb6e5ba862a902

    • SHA256

      c870c1260c0971b93525669fea8546b46ec996fa8790fae9713f7cb66c83570c

    • SHA512

      3a2e5aaadbc3e695fd8bb17d621e94e2d7462b3147cc94d04a153ae6247f237a941d82e365b3fb5a4c0ba2ae9cafdad582519bf3a4b3e3fdda49c6cadc999dea

    • SSDEEP

      12288:BgnJV5Wzce8de6akSIYG6fo/Zs1GPchRvilzP:Bgz0cVeBu66EfOP

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks