General

  • Target

    39768453c17afce045164d39f94da00f2e7278130702d41812924bd9c2c3a82a.zip

  • Size

    18KB

  • Sample

    230208-ly58eaab42

  • MD5

    971bb78630222138b4f8fee8f26ffde0

  • SHA1

    6f748a01fb375c48f3bb87a7657944a0494df862

  • SHA256

    fffd252dab3db06f226727d593a496dd82b73d4b6312f845eff32e16be7fb48b

  • SHA512

    97239d2f642d66a6a2e27f0212a5457cfcb205e9784e3e22d06be6920d0e244bdadc76cb6c7a26b3745391a2c9ef65ce37d8a9ac71be6ae0a0a948ab9a64e71f

  • SSDEEP

    384:VZxw7oSJQS6ouTAH9A4L1IPRRd4kmTO43Ck5Hk/He2p5aIg:VaQS6RKzJI5mTO43H5Hk/lp5Zg

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/cody/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      39768453c17afce045164d39f94da00f2e7278130702d41812924bd9c2c3a82a.doc

    • Size

      41KB

    • MD5

      28c91c3972300ec87144051e544ed45e

    • SHA1

      0b3c7fa689cc170eb46d6403c4e4f832646b9280

    • SHA256

      39768453c17afce045164d39f94da00f2e7278130702d41812924bd9c2c3a82a

    • SHA512

      214831419b83a4820b1334eb3da2443a4a0fac02f50c17c9db08510f06be57a7a18b761de9fc117c3c7ef579655ff57438ae48aaa69fd971f2299cd7916eeb72

    • SSDEEP

      768:cFx0XaIsnPRIa4fwJMeOwtqisMbMU9YjR7/FAIBixw0dp821Dhoqg71:cf0Xvx3EM/YTCV/FTBixwOpnoqgR

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks