General

  • Target

    b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336.zip

  • Size

    399KB

  • Sample

    230208-ly9ktshf4w

  • MD5

    f528e051ac2acb57ab5f4523b67d3104

  • SHA1

    87fed9f03b5bb996fb515caec5989b75fad18564

  • SHA256

    3d1882e6f4780e8d1efbe4e6f51e3e0aa03ced9136fcfca5a5f2b11d26469de1

  • SHA512

    f71d27b1554de4d12f4236d17372ca720faab27777d64b2173904c829db7b8b0132e4d8894ea9b292f96e3a5b90213233f2ab77cc9c0779b7ad67061e939b2ed

  • SSDEEP

    12288:2xVuEO851lRCtotreeY0ahun+IMSYKIobh:2xTn3o6adi+RzKI2h

Malware Config

Extracted

Family

lokibot

C2

http://hghfe.tk/Sameed/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336.exe

    • Size

      1.6MB

    • MD5

      00c9e269db13568cc703bd4273787201

    • SHA1

      162915bdefde5a9a317d5d68eb92f0be67cdf356

    • SHA256

      b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336

    • SHA512

      ca7d97c01bb31b312584ca856909f365bd529e517f72ec398051fea5b641a892d6303d482ca58cd7fe2e6c9847bbc964939fb187a434200dc74c98500a0cdb97

    • SSDEEP

      12288:EmIbRtHUB7lceAvWDlwFnJCSVDKhEzkpgOim0TC+j2oHa5CiDWKGmGYqITrpmc:cy0Tv6osFqITrpH

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks