General

  • Target

    27254791031b7dccc677b1234dfa8165ed0c92c2d52dbd8de521be3d91b85b5c

  • Size

    730KB

  • Sample

    230213-apgynshe92

  • MD5

    7b942d0493a242f7caf5d4295802a506

  • SHA1

    1437ff886fac1206fcf9b2e4b3c58c7c41dffe81

  • SHA256

    27254791031b7dccc677b1234dfa8165ed0c92c2d52dbd8de521be3d91b85b5c

  • SHA512

    d669c2acfc214fc70c8d7c0e97600b953f347772a1213de74b48680f5b84349ec4d024885478cca946b816cfb719f6fa94762afcddebc1628c21731f48ae263f

  • SSDEEP

    12288:9qeQ+y4lMmSbgKywmA/ZSR3UywinlDZgrqNR/pnm7wrj4U:9ZlMRSE43sGRZgrONpnm7wIU

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/kung/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      27254791031b7dccc677b1234dfa8165ed0c92c2d52dbd8de521be3d91b85b5c

    • Size

      730KB

    • MD5

      7b942d0493a242f7caf5d4295802a506

    • SHA1

      1437ff886fac1206fcf9b2e4b3c58c7c41dffe81

    • SHA256

      27254791031b7dccc677b1234dfa8165ed0c92c2d52dbd8de521be3d91b85b5c

    • SHA512

      d669c2acfc214fc70c8d7c0e97600b953f347772a1213de74b48680f5b84349ec4d024885478cca946b816cfb719f6fa94762afcddebc1628c21731f48ae263f

    • SSDEEP

      12288:9qeQ+y4lMmSbgKywmA/ZSR3UywinlDZgrqNR/pnm7wrj4U:9ZlMRSE43sGRZgrONpnm7wIU

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks