General

  • Target

    616af1ef5dbf89cfc93303575910be17.exe

  • Size

    552KB

  • Sample

    230121-kvfmxabg43

  • MD5

    616af1ef5dbf89cfc93303575910be17

  • SHA1

    0f4dbbc0347950758ba3daed9435f871331a2938

  • SHA256

    93b0d7f44fe52ecc63fc27d48da7876ee50872e2471591c0304ca21d0ccc68d6

  • SHA512

    d2cbc472c27fad183d7317af9ab86b588b4a7df992f50d75941d720ab7c8505fee7f9b66da3a1643ef2c1dcea7e8c6f6bdf04b06dba8fbc6efe30b71af7907fa

  • SSDEEP

    12288:AIAfCDolCzyg8VNWva2wSnPfFyhIk0SUbpO:PtlygM3SHFG0SUbp

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/zang/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      616af1ef5dbf89cfc93303575910be17.exe

    • Size

      552KB

    • MD5

      616af1ef5dbf89cfc93303575910be17

    • SHA1

      0f4dbbc0347950758ba3daed9435f871331a2938

    • SHA256

      93b0d7f44fe52ecc63fc27d48da7876ee50872e2471591c0304ca21d0ccc68d6

    • SHA512

      d2cbc472c27fad183d7317af9ab86b588b4a7df992f50d75941d720ab7c8505fee7f9b66da3a1643ef2c1dcea7e8c6f6bdf04b06dba8fbc6efe30b71af7907fa

    • SSDEEP

      12288:AIAfCDolCzyg8VNWva2wSnPfFyhIk0SUbpO:PtlygM3SHFG0SUbp

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks