General

  • Target

    49f0d6e43350d8fb69f5cd2072c6a5c2.bin

  • Size

    552KB

  • Sample

    230206-ksvztach59

  • MD5

    bda73d5a8fd3e39af4eb93ca76636a14

  • SHA1

    d5c31d3b0fcad007f60ef8fdb5c6e015e0a5a2c6

  • SHA256

    9cd4fe47284462ab20e28e256706d0b4fe49f16e8f816b19cf5835159aef0657

  • SHA512

    6ca47b5ae31be3dc089542b99b3457f32274b699bd84cee809c7da55bb93945f9350aa0b2d3335e96d9f76c91aaf18628257b0531c747b9eedda635eb19339df

  • SSDEEP

    12288:Tm09xXcogUEhAYKVCGZoMAt63ADs3eoggCQcKmRDU/:TmaBcmEhAxQjydeoggCQcKmRDG

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/gk1/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ae25e045665c1d44a4a01fb8b902a2f8c6eff324c16e08ebc35761ef378ded78.exe

    • Size

      669KB

    • MD5

      49f0d6e43350d8fb69f5cd2072c6a5c2

    • SHA1

      4b4ff4f0fb248c14a915a9bfa00e8ac25ec0603b

    • SHA256

      ae25e045665c1d44a4a01fb8b902a2f8c6eff324c16e08ebc35761ef378ded78

    • SHA512

      734db8b58be794620cbe5d260f7f43d176dfac8ecc140c56b607e90a2e8485d81ca5666fc50ef18f675b1a760ca1ad09c2036963ff76ac7aceafdf739c017583

    • SSDEEP

      12288:Qtz8L6guquZajfTIISp83HqvKiiAEMToaxMRSR5SOqG4yPa:ZLPwCTIlEHOipMkayRU5JqG4yPa

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks