General

  • Target

    99e69a797b5bc14f55127bc7100aabb37683008fd89043a116c83f5255a1e6d1.zip

  • Size

    675KB

  • Sample

    230208-ly58eahf3y

  • MD5

    7df4f9c83a30b95d8e3cfca1207e8114

  • SHA1

    412f3e4f43974f851a19e97e583f0de2d9489679

  • SHA256

    802ee60a4dea6dbdd586893327d9ff87805089584ecc7b6b884d7eab42b6467b

  • SHA512

    de4e03cd1fe385e68d3f0e6832e49267fb5207f242e991c2feb9aef137b3f17df872a7f3dde99499a7028f87ab1ed24dd19093d5a5ce3986ad54f4ebb4fc6dac

  • SSDEEP

    12288:P91UdM6PonOZSQw9rySuqxJGsCNxo7ck2+9v5VPE+j7cbrHhQsKhnb1m6fk:Fh6PoO3dSuqDGsC76B5VPdjgbrLib1mF

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/line/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      99e69a797b5bc14f55127bc7100aabb37683008fd89043a116c83f5255a1e6d1.exe

    • Size

      705KB

    • MD5

      40ea3a0c428397cc2feb2675cc37150c

    • SHA1

      8b1a787ff8c044e5503139ceef1b68d68cff1f89

    • SHA256

      99e69a797b5bc14f55127bc7100aabb37683008fd89043a116c83f5255a1e6d1

    • SHA512

      ca903e627047cd8321acebfdd0f1227dd59e6e42361897936b05d2ba443d15c0176f3360d4cd47eb395947a932dcfc642a48ccc877b2eb0fc6b400123e5e9b3b

    • SSDEEP

      12288:QpkNPA7cXnyXx6q16ahRZ5G1MQZAbRIgY5NiTisiS8fHXYvlC:pA71NMS5G1MQZAbRI35ATisizHXY

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks