General

  • Target

    025207095ce4531ddc16d0c1dce457cb.bin

  • Size

    452KB

  • Sample

    230203-j1l67sgc8y

  • MD5

    b92d6894472778ad6f3d048e5d718f4f

  • SHA1

    01fada54d57620bc7a526a154d7f394284279da9

  • SHA256

    f84c1c8283b5309239f35857770cfd07295cd1caa667b3d3c4ff9e9da3418d9d

  • SHA512

    7aa0690532c5eb3b5c70964e7ef3d5f95252dc646c167e9f515a28a3e62e83dca86dd9ddc6f83b1783ee67446beddd09798050d0c3a339c927156635b745b18a

  • SSDEEP

    12288:unxA1Tz75gamx82yPpryTmukI+XjCvom9wMZ81y:unuH75g7spryTmHI+XjCvx9ko

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e7ecce5580d7ffce80b2921d953d528aeb9c1f724a49d91db380478c5423c3f2.exe

    • Size

      477KB

    • MD5

      025207095ce4531ddc16d0c1dce457cb

    • SHA1

      afb61d96ff8eb5974109a1fdd59559f1ca7cf6db

    • SHA256

      e7ecce5580d7ffce80b2921d953d528aeb9c1f724a49d91db380478c5423c3f2

    • SHA512

      b029525635baa96e1b3c969899cc92b8cd7a512dcfa3b6f180e8dbcc7f3ae48a69fee48bbd9f70ed9f2f795c10daec30f9a93fe1a39e60f09309ae4a02bda662

    • SSDEEP

      12288:6r8i69LjbTQmvpuAHoZ/A/UrrWXQG4dWtb9i7+pvtCWtO:6r8i2bTDMSqrWADdObw6Rch

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks