General

  • Target

    bfb61209af275628632fadfb1a72c8a22e5bf64d0ecdea40461b493fe3e6ca80

  • Size

    806KB

  • Sample

    230120-rqapesbb49

  • MD5

    54b70bbfe10136b7e5386397362be742

  • SHA1

    0faad80fbaa71d3659eaf3152073a32f5af29ec1

  • SHA256

    bfb61209af275628632fadfb1a72c8a22e5bf64d0ecdea40461b493fe3e6ca80

  • SHA512

    a03e086ec6ec67c63882de017c7cc2b395a8e1e52d09028709e516d92bd36aa1ca443b4bc271ed0c7deab658c2e9a06cfb42ef9b597bebff06e9e6055aef43c1

  • SSDEEP

    24576:Z7C4oXy3XcDSEh76rbJkwTw4lg+lz4OPd:tC4oL6rZlz5

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/zang/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      bfb61209af275628632fadfb1a72c8a22e5bf64d0ecdea40461b493fe3e6ca80

    • Size

      806KB

    • MD5

      54b70bbfe10136b7e5386397362be742

    • SHA1

      0faad80fbaa71d3659eaf3152073a32f5af29ec1

    • SHA256

      bfb61209af275628632fadfb1a72c8a22e5bf64d0ecdea40461b493fe3e6ca80

    • SHA512

      a03e086ec6ec67c63882de017c7cc2b395a8e1e52d09028709e516d92bd36aa1ca443b4bc271ed0c7deab658c2e9a06cfb42ef9b597bebff06e9e6055aef43c1

    • SSDEEP

      24576:Z7C4oXy3XcDSEh76rbJkwTw4lg+lz4OPd:tC4oL6rZlz5

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks