General

  • Target

    83b2aa4a9a364df9acd4a24d5fcff6379cc29d837756ed3449da40e35028a8ba

  • Size

    404KB

  • Sample

    230129-y4skqadd8z

  • MD5

    4ff927bef1e44f4faa69873b8c57e906

  • SHA1

    9d00e3ad603240a78e2f25a1a1fd1f336bba31b5

  • SHA256

    83b2aa4a9a364df9acd4a24d5fcff6379cc29d837756ed3449da40e35028a8ba

  • SHA512

    1b640ccde212ff239e915d83f995d96064c21d6c3da462e94997b145ed57615e69d301fd0cbde2107ffc46797eb5e3d71de7106ca2fdaa884b75a4587e7e8db9

  • SSDEEP

    6144:0+qRnuSUxo4fUvmBUBHGCjPFEPPOw6/dAGHrJhB6onyXwrBnNN:0+qRuSUZUvmBU8CSPM/zHthfnywFj

Malware Config

Extracted

Family

lokibot

C2

http://opdebeeck-vvorth.com/f3/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      83b2aa4a9a364df9acd4a24d5fcff6379cc29d837756ed3449da40e35028a8ba

    • Size

      404KB

    • MD5

      4ff927bef1e44f4faa69873b8c57e906

    • SHA1

      9d00e3ad603240a78e2f25a1a1fd1f336bba31b5

    • SHA256

      83b2aa4a9a364df9acd4a24d5fcff6379cc29d837756ed3449da40e35028a8ba

    • SHA512

      1b640ccde212ff239e915d83f995d96064c21d6c3da462e94997b145ed57615e69d301fd0cbde2107ffc46797eb5e3d71de7106ca2fdaa884b75a4587e7e8db9

    • SSDEEP

      6144:0+qRnuSUxo4fUvmBUBHGCjPFEPPOw6/dAGHrJhB6onyXwrBnNN:0+qRuSUZUvmBU8CSPM/zHthfnywFj

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks