General

  • Target

    76508BEC6DB5BF37EC4D0EC301AA607B30AEFD1AC0DC0.exe

  • Size

    550KB

  • Sample

    230205-vwzghsac29

  • MD5

    a46c816dec5e5b223c312f3ef7ac24d0

  • SHA1

    69d5efe2394c4a21bfeccee6aee69a12a06d31e9

  • SHA256

    76508bec6db5bf37ec4d0ec301aa607b30aefd1ac0dc0a5ea91dcf12bf076ec6

  • SHA512

    dd2159ffd4708583e8effc649d8ce3280fb5a968e1b253982020fb4922cc1a723b0d6f84875439c9d6db6e098b0b85f8d8aa497c947e9cd9ce2f34c6b80de293

  • SSDEEP

    6144:fZXnyAZYtYUfe7xCQkGBb/A3LlkHWcA0I7uyMrtYty10DAgBjwSwDpL8CIHPLmWJ:fZXTjn+Ywf9zzC0Km3CjhRHjMylwt

Malware Config

Extracted

Family

lokibot

C2

http://rhinestone.cc/obino/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      76508BEC6DB5BF37EC4D0EC301AA607B30AEFD1AC0DC0.exe

    • Size

      550KB

    • MD5

      a46c816dec5e5b223c312f3ef7ac24d0

    • SHA1

      69d5efe2394c4a21bfeccee6aee69a12a06d31e9

    • SHA256

      76508bec6db5bf37ec4d0ec301aa607b30aefd1ac0dc0a5ea91dcf12bf076ec6

    • SHA512

      dd2159ffd4708583e8effc649d8ce3280fb5a968e1b253982020fb4922cc1a723b0d6f84875439c9d6db6e098b0b85f8d8aa497c947e9cd9ce2f34c6b80de293

    • SSDEEP

      6144:fZXnyAZYtYUfe7xCQkGBb/A3LlkHWcA0I7uyMrtYty10DAgBjwSwDpL8CIHPLmWJ:fZXTjn+Ywf9zzC0Km3CjhRHjMylwt

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks