General

  • Target

    96f0b33adcd3fca2a0193ce24095d142d15636a124a31dec0ec109ac0e0b5363

  • Size

    722KB

  • Sample

    230201-at25eada41

  • MD5

    8d9c5a9ce7a94df0ce3d180c45c0b328

  • SHA1

    0da82f448ec2262be3bd84af55ab926d0b7ab811

  • SHA256

    96f0b33adcd3fca2a0193ce24095d142d15636a124a31dec0ec109ac0e0b5363

  • SHA512

    844c3e958ff48b302c565c2ee19d38234c6ab0841572e22d4aee7b4f6ad46e2a81e4509660208ddf9abec09e8c279dda2c89c3cc211f076677c82ce59c9ef7f8

  • SSDEEP

    12288:UepaXr8WfkmhRfK07ihwOAY58MEBNXylheRCeey9i7+pvhc4N34:UepaXr8WsmhuhlzqvBQte9w6Rhc4N34

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/gk1/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      96f0b33adcd3fca2a0193ce24095d142d15636a124a31dec0ec109ac0e0b5363

    • Size

      722KB

    • MD5

      8d9c5a9ce7a94df0ce3d180c45c0b328

    • SHA1

      0da82f448ec2262be3bd84af55ab926d0b7ab811

    • SHA256

      96f0b33adcd3fca2a0193ce24095d142d15636a124a31dec0ec109ac0e0b5363

    • SHA512

      844c3e958ff48b302c565c2ee19d38234c6ab0841572e22d4aee7b4f6ad46e2a81e4509660208ddf9abec09e8c279dda2c89c3cc211f076677c82ce59c9ef7f8

    • SSDEEP

      12288:UepaXr8WfkmhRfK07ihwOAY58MEBNXylheRCeey9i7+pvhc4N34:UepaXr8WsmhuhlzqvBQte9w6Rhc4N34

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks