General

  • Target

    a2030b4cc31eeba0dec3265f4a30324f1825bd5c2fcff922836d7d4d8cfb085e.zip

  • Size

    345KB

  • Sample

    230208-ly9wlahf4x

  • MD5

    1041a152b11fae685339bf15af4f891c

  • SHA1

    4ff0edb6f1032460b63970108488b2dc51878b89

  • SHA256

    3066f6062bc4b5baa2a8737bf9ea45149838363b3d52506903e525943d26bc05

  • SHA512

    f49073c5ce89128549624a032a1e7d4c75d3811b7ee7065cbf735a780078b3e717eefc360b7f0bd46a830722c798e0b1cf447dacab7cf8d68123206908f0214c

  • SSDEEP

    6144:SgRmLk99BKi1L/R0okmDxAdVfAzxTDj74GbfG/o7+3w:SgRmO9cMKokmDQfAzZH0mb7+3w

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha7/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a2030b4cc31eeba0dec3265f4a30324f1825bd5c2fcff922836d7d4d8cfb085e.exe

    • Size

      516KB

    • MD5

      38e7aacad8e6cd46fc2dddfa743b223f

    • SHA1

      e1e48d6876856ddefb800d2d9f15efee5ed64ff6

    • SHA256

      a2030b4cc31eeba0dec3265f4a30324f1825bd5c2fcff922836d7d4d8cfb085e

    • SHA512

      48c2b0b8d2e54c27063e0fd68012fc2fe7fab2422ce85d7cd7876cfb0d872724a839f54a650749b999b55d74df73ff6a584adbee7de25499fa7410dc41f65a18

    • SSDEEP

      12288:V6LPDcQVElDne7f4WYMTyPdLX2tuCAe/ZX55x8qdAZBWf5i7qAO4Nxbe+FiFF6:Vgc0y7MTyPdLX2tuCAe/ZXxL+rOkbe+s

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks