General

  • Target

    kellyzx.exe

  • Size

    477KB

  • Sample

    230131-zvesyacc61

  • MD5

    025207095ce4531ddc16d0c1dce457cb

  • SHA1

    afb61d96ff8eb5974109a1fdd59559f1ca7cf6db

  • SHA256

    e7ecce5580d7ffce80b2921d953d528aeb9c1f724a49d91db380478c5423c3f2

  • SHA512

    b029525635baa96e1b3c969899cc92b8cd7a512dcfa3b6f180e8dbcc7f3ae48a69fee48bbd9f70ed9f2f795c10daec30f9a93fe1a39e60f09309ae4a02bda662

  • SSDEEP

    12288:6r8i69LjbTQmvpuAHoZ/A/UrrWXQG4dWtb9i7+pvtCWtO:6r8i2bTDMSqrWADdObw6Rch

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      kellyzx.exe

    • Size

      477KB

    • MD5

      025207095ce4531ddc16d0c1dce457cb

    • SHA1

      afb61d96ff8eb5974109a1fdd59559f1ca7cf6db

    • SHA256

      e7ecce5580d7ffce80b2921d953d528aeb9c1f724a49d91db380478c5423c3f2

    • SHA512

      b029525635baa96e1b3c969899cc92b8cd7a512dcfa3b6f180e8dbcc7f3ae48a69fee48bbd9f70ed9f2f795c10daec30f9a93fe1a39e60f09309ae4a02bda662

    • SSDEEP

      12288:6r8i69LjbTQmvpuAHoZ/A/UrrWXQG4dWtb9i7+pvtCWtO:6r8i2bTDMSqrWADdObw6Rch

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks