General

  • Target

    57cdb4d1bc88747a4552289f269a58948d096853d812b2224feab1751d974c30

  • Size

    661KB

  • Sample

    230123-rwr6nafc4y

  • MD5

    d3ee7393910bb75330afc26aac3a742a

  • SHA1

    ecac5b1a9f4a9242dd6dcce1a5405e2f1c5a1098

  • SHA256

    57cdb4d1bc88747a4552289f269a58948d096853d812b2224feab1751d974c30

  • SHA512

    9e9753e0040fddb89be965125ef1fec5b71a7f043065af8131b411a1449abef0e231fc6a8683a7a87dcbb7b486dcf7f9b39e10816303c0a0e9506af0002dcb08

  • SSDEEP

    12288:CHK1X2iNV66BbHOo66BamDadHVRE1CGyXBJAZ98sh5+7:L1nVdnV0mDaPR4pYBJAD8sb+

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      57cdb4d1bc88747a4552289f269a58948d096853d812b2224feab1751d974c30

    • Size

      661KB

    • MD5

      d3ee7393910bb75330afc26aac3a742a

    • SHA1

      ecac5b1a9f4a9242dd6dcce1a5405e2f1c5a1098

    • SHA256

      57cdb4d1bc88747a4552289f269a58948d096853d812b2224feab1751d974c30

    • SHA512

      9e9753e0040fddb89be965125ef1fec5b71a7f043065af8131b411a1449abef0e231fc6a8683a7a87dcbb7b486dcf7f9b39e10816303c0a0e9506af0002dcb08

    • SSDEEP

      12288:CHK1X2iNV66BbHOo66BamDadHVRE1CGyXBJAZ98sh5+7:L1nVdnV0mDaPR4pYBJAD8sb+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks