General

  • Target

    TRANSFERENCIA RÁPIDA.lzh.pdf

  • Size

    341KB

  • Sample

    230206-vjzazsfa37

  • MD5

    237e5cee02159145b7984333b31307c0

  • SHA1

    224de7a266ba9be1778035f934908e8b7dcc0a1f

  • SHA256

    4b2d09b9305fa741f3853b1d0e78830aec145ba0efdd3c888e92010f5467cf82

  • SHA512

    5da1fb2ba30fc944ad0f7329b465b1cd1f13d27b9925a1b8b20c6c9673ae64b59f6b4c097bbf5dd904387b4da7d2278933fb9539cf21e15e5f279d532e586fa9

  • SSDEEP

    6144:t4eddl+SIHETTiSp5ZynPPL/dfuyCbesCW8r9w4AOGtbRH1buUTi3OO/Ez6C:t4YG2Z8/NORgKOGBjbM+fZ

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha7/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      TRANSFERENCIA RÁPIDA.exe

    • Size

      516KB

    • MD5

      38e7aacad8e6cd46fc2dddfa743b223f

    • SHA1

      e1e48d6876856ddefb800d2d9f15efee5ed64ff6

    • SHA256

      a2030b4cc31eeba0dec3265f4a30324f1825bd5c2fcff922836d7d4d8cfb085e

    • SHA512

      48c2b0b8d2e54c27063e0fd68012fc2fe7fab2422ce85d7cd7876cfb0d872724a839f54a650749b999b55d74df73ff6a584adbee7de25499fa7410dc41f65a18

    • SSDEEP

      12288:V6LPDcQVElDne7f4WYMTyPdLX2tuCAe/ZX55x8qdAZBWf5i7qAO4Nxbe+FiFF6:Vgc0y7MTyPdLX2tuCAe/ZXxL+rOkbe+s

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks