Analysis

  • max time kernel
    132s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-02-2023 23:10

General

  • Target

    0c32ffa8a2b91fe822e28dea19b2f2cd1f10c4821a8d28cf1ee298dd401da405.exe

  • Size

    325KB

  • MD5

    2c2a9dcfa9fbb8ed1c44a11e19afbb58

  • SHA1

    f7f279f9a9af32795e996b015740508385c20182

  • SHA256

    0c32ffa8a2b91fe822e28dea19b2f2cd1f10c4821a8d28cf1ee298dd401da405

  • SHA512

    329921636a9d8f44308c4778aafa07cae43304a0f781af8de767435becd0c92636bea4f3420d71b3e7ec28d60ab188ce36d44628e04c68f1e45a42342b54b8db

  • SSDEEP

    3072:yIdE3CLen81R/9fLRmNpHfg3rbUVm/HiPFXFnyuVpSHAsm0+L4Oi/XcLY7VNr/UT:WyL31R/cp/g3rgjFLplsm0+MOKXpLUT

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/kung/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c32ffa8a2b91fe822e28dea19b2f2cd1f10c4821a8d28cf1ee298dd401da405.exe
    "C:\Users\Admin\AppData\Local\Temp\0c32ffa8a2b91fe822e28dea19b2f2cd1f10c4821a8d28cf1ee298dd401da405.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/764-133-0x00000000020C0000-0x00000000020DB000-memory.dmp

    Filesize

    108KB

  • memory/764-132-0x000000000054E000-0x0000000000564000-memory.dmp

    Filesize

    88KB

  • memory/764-134-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/764-135-0x000000000054E000-0x0000000000564000-memory.dmp

    Filesize

    88KB

  • memory/764-136-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB