General

  • Target

    cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456

  • Size

    1.2MB

  • Sample

    230129-y8pdvscb43

  • MD5

    28623b26c8ba26b82ae87d192d71c1a2

  • SHA1

    8691ebc6dcf40563adee031c7b9dbf692a9106b9

  • SHA256

    cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456

  • SHA512

    7567ec1025b2291ac4008b92fe4604eb4345285cf3b68952e1a0db327cd90446ded4f9def70a46dab8d5d73a0fa3ed27dcdd7e6f95ecd12c171511f2600cf5e8

  • SSDEEP

    12288:R3ojRIQeeo3o0M9bWyFDrBulRbRbs1pCJd28bsEbuhv2jZaAL7ujXIZbMDRr+4JW:t7iepJdzupSEYutcvUjkczozEI86A

Malware Config

Extracted

Family

lokibot

C2

http://tuqianq.com/kali/kali/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456

    • Size

      1.2MB

    • MD5

      28623b26c8ba26b82ae87d192d71c1a2

    • SHA1

      8691ebc6dcf40563adee031c7b9dbf692a9106b9

    • SHA256

      cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456

    • SHA512

      7567ec1025b2291ac4008b92fe4604eb4345285cf3b68952e1a0db327cd90446ded4f9def70a46dab8d5d73a0fa3ed27dcdd7e6f95ecd12c171511f2600cf5e8

    • SSDEEP

      12288:R3ojRIQeeo3o0M9bWyFDrBulRbRbs1pCJd28bsEbuhv2jZaAL7ujXIZbMDRr+4JW:t7iepJdzupSEYutcvUjkczozEI86A

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks