General

  • Target

    8edab3d9b5bc81b5ef374f427a2dac801ada0d6fbd0b913b6908ece1ce7768ac.zip

  • Size

    259KB

  • Sample

    230208-ly8zasab53

  • MD5

    016d79fffb093f56513f8813c9bb5eb5

  • SHA1

    a2f51a0d018a6beb8675dda4cb942e26576af124

  • SHA256

    5fdb4c2a26b335b47b81bae4f50e4d5c156d3f4d761f084805fad2d5684f662c

  • SHA512

    7e5f242ef7d9dd4b608fec0237a8797ac127bf1f94df83f333e9621258198dc0ce469055bc5291921bedf80d112f84b1fe9f771da17ca0d6f8c101576e326b99

  • SSDEEP

    6144:JKu+dFGsDs75S39a8XMNHDvrzhvNWH0TzeMgsOCFysEG:J4Es0gwVtvNWUG7sO92

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha12/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Shippment Swift Copy.exe

    • Size

      344KB

    • MD5

      8ed4cf27c1633d3c25e6980f5ee8d8fa

    • SHA1

      10565a5953569a1657afa4873401e2d8e8940f2b

    • SHA256

      a3c7d60f19310f7dbecce1acba480a79cc7d7839aed4467bdd3eb374bfcd68eb

    • SHA512

      4296e8bb86e2b6cfbedc8fe856bd66956cf1a6688ba1d19d9ccaae5544f62daf866329ab35bf20d541e7a161b21163c4f61346828cc923138ce4509a98447a7d

    • SSDEEP

      6144:8Ya6O4eRhQ9sVnQxU1vg8eE9N43l6lE/Ml6yZq0Shc8PGzAZ:8Y1eRh3nWUJg8eE99l6Uq0Shc/zC

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks