General

  • Target

    deposit slip.exe

  • Size

    809KB

  • Sample

    230122-r9v5gagd29

  • MD5

    c41958dcf417c30e777db638ddf5796e

  • SHA1

    67692e5a4294aef572ee81ddbd2d35279ab435e1

  • SHA256

    afe9121bf6f7ce38e5a3af51cf28e50297f80ccb3bc8a670b6ce1a209f0955d9

  • SHA512

    453cda0f322cac562063ab91ddccf5035044e5f6c7606995ba0321f4fb27398359748ce0e545f7679b9912935f881897d673ea9ce0de9ba7d9ea72000b20899e

  • SSDEEP

    12288:shS45nJrTmHkFrVoaqnw9Ewj/l4xHmvGO0ZPhojNP:6S4PkkFr2W/d6OAZPCjNP

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.148/health1/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      deposit slip.exe

    • Size

      809KB

    • MD5

      c41958dcf417c30e777db638ddf5796e

    • SHA1

      67692e5a4294aef572ee81ddbd2d35279ab435e1

    • SHA256

      afe9121bf6f7ce38e5a3af51cf28e50297f80ccb3bc8a670b6ce1a209f0955d9

    • SHA512

      453cda0f322cac562063ab91ddccf5035044e5f6c7606995ba0321f4fb27398359748ce0e545f7679b9912935f881897d673ea9ce0de9ba7d9ea72000b20899e

    • SSDEEP

      12288:shS45nJrTmHkFrVoaqnw9Ewj/l4xHmvGO0ZPhojNP:6S4PkkFr2W/d6OAZPCjNP

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks