General

  • Target

    830a6e441562dc6c4401ca770043d4e5e715c74349b10e9ee00af0815d04ff6b.zip

  • Size

    137KB

  • Sample

    230208-ly6h6sab43

  • MD5

    2d909bc92d890769885f20357635d64a

  • SHA1

    85eb891c9414073692f9e5f74fa58d80edb238bb

  • SHA256

    8055e72b9b89d999ecd3f60e3d22ba96ede06e6aa82c18808dee1c166e105d0b

  • SHA512

    1ebcd5a890d740931200e9aa06a6608a3b6eb4efe13385cdabf058e08e734f7eec770e31a802eb354bfddc2db78927acbb63423378241dcb3c81fd39edd302f9

  • SSDEEP

    3072:DMmNtcW13uyC3Wm4dmv2zqFoHR+wWBoNOCtHRw9E06:DMK7uyC3WEvHSHRyBoEWRXJ

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/mous/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      830a6e441562dc6c4401ca770043d4e5e715c74349b10e9ee00af0815d04ff6b.exe

    • Size

      195KB

    • MD5

      70c4f605d2d1c23186666d7015154f3d

    • SHA1

      55a5d74abe09786d148afbe0990882fcc4487bf6

    • SHA256

      830a6e441562dc6c4401ca770043d4e5e715c74349b10e9ee00af0815d04ff6b

    • SHA512

      76d74643e66dae59d5090db1a5ee70b73ddcf17e182847259090699727c45c2872862b6b310eb86e246a3e740a03d393523101947c95e749b2553d49b2000064

    • SSDEEP

      3072:LWaKOCuWxQjWVuLgktzWcT+S5QWcREIEJgoPSLNmY7MUUU4YJ/s:qaKRwhLBtzuDWHqoPetFUVYJ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks