General

  • Target

    f52f70447cbebf182eeaa5a0a48ee305c59e00307b69a7eae7ea6517c0fb5bb6

  • Size

    149KB

  • Sample

    230129-xvm37sbg9s

  • MD5

    1fe16c903136a091bf235245ee09b9d1

  • SHA1

    83ef584729558e76d20491695acbb773af6f2b47

  • SHA256

    f52f70447cbebf182eeaa5a0a48ee305c59e00307b69a7eae7ea6517c0fb5bb6

  • SHA512

    c541ce43144deed3fd381bd760b1ce349a89b00b397e8056d06bbc98c7c733df99ebf42eb6c6c287c4fef45d419597b750092ec5e0a9d319852e69019f2c7706

  • SSDEEP

    3072:rf1BDZ0kVB67Duw9AMcTbsxhicKW5QO8ND7kN8JBpdL0jIhz2bqSxbz5H/Tjju4S:r9X0Gfs+DOg0YdLAIllc/TjjuoKeXmd

Malware Config

Extracted

Family

lokibot

C2

http://becharnise.ir/fb3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f52f70447cbebf182eeaa5a0a48ee305c59e00307b69a7eae7ea6517c0fb5bb6

    • Size

      149KB

    • MD5

      1fe16c903136a091bf235245ee09b9d1

    • SHA1

      83ef584729558e76d20491695acbb773af6f2b47

    • SHA256

      f52f70447cbebf182eeaa5a0a48ee305c59e00307b69a7eae7ea6517c0fb5bb6

    • SHA512

      c541ce43144deed3fd381bd760b1ce349a89b00b397e8056d06bbc98c7c733df99ebf42eb6c6c287c4fef45d419597b750092ec5e0a9d319852e69019f2c7706

    • SSDEEP

      3072:rf1BDZ0kVB67Duw9AMcTbsxhicKW5QO8ND7kN8JBpdL0jIhz2bqSxbz5H/Tjju4S:r9X0Gfs+DOg0YdLAIllc/TjjuoKeXmd

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks