General

  • Target

    26f31b698376af399a1d75715975f88370ff13c53751950649b86fce186f0fb0

  • Size

    353KB

  • Sample

    230129-zbb8psdf7s

  • MD5

    e3f8e033875a82ab63588f8feee23893

  • SHA1

    7272f754aeaffb52c1e7ad7b5181761cc085c410

  • SHA256

    26f31b698376af399a1d75715975f88370ff13c53751950649b86fce186f0fb0

  • SHA512

    ba5eff3610afbbb535c099877ded4bc59c99f0e59ed8c582784b53ab91e6448c1211694ef4581640b4713bf95d829bc799ad91cbe41270ebff379f79f8234fbf

  • SSDEEP

    6144:ueVy26SwvpXpLUbvdeIZs56PbwFeA8uIYzaEo4wbgsUER26ZpnPpCw1N:ueVy+wvpXpATdeIZsoPbwFeyrzho4wbD

Malware Config

Extracted

Family

lokibot

C2

http://cyrpbrotlimeklim.sytes.net/Oildjfirm/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      26f31b698376af399a1d75715975f88370ff13c53751950649b86fce186f0fb0

    • Size

      353KB

    • MD5

      e3f8e033875a82ab63588f8feee23893

    • SHA1

      7272f754aeaffb52c1e7ad7b5181761cc085c410

    • SHA256

      26f31b698376af399a1d75715975f88370ff13c53751950649b86fce186f0fb0

    • SHA512

      ba5eff3610afbbb535c099877ded4bc59c99f0e59ed8c582784b53ab91e6448c1211694ef4581640b4713bf95d829bc799ad91cbe41270ebff379f79f8234fbf

    • SSDEEP

      6144:ueVy26SwvpXpLUbvdeIZs56PbwFeA8uIYzaEo4wbgsUER26ZpnPpCw1N:ueVy+wvpXpATdeIZsoPbwFeyrzho4wbD

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks