General

  • Target

    86ecf018b7711d3a453ceeca71cdd7fe.exe

  • Size

    184KB

  • Sample

    230123-ytal6agg9t

  • MD5

    86ecf018b7711d3a453ceeca71cdd7fe

  • SHA1

    343a3005c6729f4ceb2dc3c9b0a44aa317d0a99a

  • SHA256

    a33eccf055f2f191059c156d868aaf2cf5f1c451587b23e41bfcd77f5b0eacc0

  • SHA512

    3e070d28644fc03364c8a419a6c618a069c069a3fa445e96b7d09faa9b9139456a4f42027e55fb9445d504e71a31eecde798728181f9c511ab46eb68c487a14a

  • SSDEEP

    3072:HfY/TU9fE9PEtuFbpwhkfFRpS5FKR2AYs5wuoe9Zn/t0tYa2eC+P/TNPJWq94Jnp:/Ya6DpCmhS02Ls+49Zn/StYGCE/TKqqT

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      86ecf018b7711d3a453ceeca71cdd7fe.exe

    • Size

      184KB

    • MD5

      86ecf018b7711d3a453ceeca71cdd7fe

    • SHA1

      343a3005c6729f4ceb2dc3c9b0a44aa317d0a99a

    • SHA256

      a33eccf055f2f191059c156d868aaf2cf5f1c451587b23e41bfcd77f5b0eacc0

    • SHA512

      3e070d28644fc03364c8a419a6c618a069c069a3fa445e96b7d09faa9b9139456a4f42027e55fb9445d504e71a31eecde798728181f9c511ab46eb68c487a14a

    • SSDEEP

      3072:HfY/TU9fE9PEtuFbpwhkfFRpS5FKR2AYs5wuoe9Zn/t0tYa2eC+P/TNPJWq94Jnp:/Ya6DpCmhS02Ls+49Zn/StYGCE/TKqqT

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks