General

  • Target

    c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e

  • Size

    149KB

  • Sample

    230129-xvsnpaad62

  • MD5

    6b9392df6b7881b18c34f13e84070d2e

  • SHA1

    09f710957da335683e6b4091917abd2926df5b8d

  • SHA256

    c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e

  • SHA512

    185c2e432dfa7222fce16088b2b3fca01c995268b756400c3d9ff2d6f4254e02ba9573f8ce2a1ff32ad9b41df979dacc44c1ba76291e3da289a5d65b53ae9d0d

  • SSDEEP

    3072:rf1BDZ0kVB67Duw9AMcTbDQ3QNsZy94wEy/RRWn9s2YB8zvr7t+o35G/tQnOiV2B:r9X0GfNNs8ey/vV248Tn5AgO5d

Malware Config

Extracted

Family

lokibot

C2

http://becharnise.ir/fb3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e

    • Size

      149KB

    • MD5

      6b9392df6b7881b18c34f13e84070d2e

    • SHA1

      09f710957da335683e6b4091917abd2926df5b8d

    • SHA256

      c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e

    • SHA512

      185c2e432dfa7222fce16088b2b3fca01c995268b756400c3d9ff2d6f4254e02ba9573f8ce2a1ff32ad9b41df979dacc44c1ba76291e3da289a5d65b53ae9d0d

    • SSDEEP

      3072:rf1BDZ0kVB67Duw9AMcTbDQ3QNsZy94wEy/RRWn9s2YB8zvr7t+o35G/tQnOiV2B:r9X0GfNNs8ey/vV248Tn5AgO5d

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks