General

  • Target

    TRANSFERENCIA RÁPIDA.IMG

  • Size

    1.2MB

  • Sample

    230206-vjypfsfa36

  • MD5

    47a95b7a538ed79dd4674d2c1a1f7e9e

  • SHA1

    895ea0594aa9b547740a858186315619fef20053

  • SHA256

    2a3d80eb90f209dde55752ac3b1fef298277d76e5137cfc364a79fdb5637e33b

  • SHA512

    478aad656f40ad8264317d48bd93afedcc09a4a8c39a7d67cab72baf59326466ba76dcfd1833573e366a757129ccb147f1a7d9c419744549c16949b2679a893b

  • SSDEEP

    24576:Vgc0y7MTyPdLX2tuCAe/ZXxL+rOkbe+FSF:2UbeGS

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha7/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      TRANSFER.EXE

    • Size

      516KB

    • MD5

      38e7aacad8e6cd46fc2dddfa743b223f

    • SHA1

      e1e48d6876856ddefb800d2d9f15efee5ed64ff6

    • SHA256

      a2030b4cc31eeba0dec3265f4a30324f1825bd5c2fcff922836d7d4d8cfb085e

    • SHA512

      48c2b0b8d2e54c27063e0fd68012fc2fe7fab2422ce85d7cd7876cfb0d872724a839f54a650749b999b55d74df73ff6a584adbee7de25499fa7410dc41f65a18

    • SSDEEP

      12288:V6LPDcQVElDne7f4WYMTyPdLX2tuCAe/ZX55x8qdAZBWf5i7qAO4Nxbe+FiFF6:Vgc0y7MTyPdLX2tuCAe/ZXxL+rOkbe+s

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks