General

  • Target

    c6e65200ca75517312a1787338289bf89a3753c7065b63ff314b0214a31b508f.zip

  • Size

    52KB

  • Sample

    230208-ly97csab55

  • MD5

    27f063cd9bb841a33db16e7fcffac360

  • SHA1

    aae60b98fcec3819760ee876cfb1ffc6aa19c052

  • SHA256

    396993436cded833c5cf7e7de4d11a1653fab11d06e8e5121caf2536087a4eaf

  • SHA512

    a517a98d784ac56214acc1b45bae14202cece167931b1e9ca93572313bdb829c39506f52e3e45f34cabef535a056c6fb1325250812fb1f843fe22f2fccf9f605

  • SSDEEP

    1536:4jIDRs48GPQtpci4K6jv5QPNQBqDSmhZaghXwx:4jIDi48oQtpci4K675ON/Dnh0g9wx

Malware Config

Extracted

Family

lokibot

C2

http://phoenixcreation.in/js/js/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c6e65200ca75517312a1787338289bf89a3753c7065b63ff314b0214a31b508f.exe

    • Size

      648KB

    • MD5

      02fd87ee564cabe3e669053eccdcda98

    • SHA1

      bacc41873a28529766c2abf68b6ee5dbd02f4405

    • SHA256

      c6e65200ca75517312a1787338289bf89a3753c7065b63ff314b0214a31b508f

    • SHA512

      6fbca99d17e06215fce1420dbeb5d4908f94510965846b837ebb5edc48c48eb36cd50653b72b6b47b9bc9105b898cf5448cfe9d59e1efc9a641b141492057431

    • SSDEEP

      1536:vzvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq8Izmd:USHIG6mQwGmfOQd8YhY0/ExUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks