General

  • Target

    fd63f671c5984fd1cd39cf00e35bf5e978b8dedce3e209d29c120325f1984254

  • Size

    752KB

  • Sample

    230310-jyxj6aea4x

  • MD5

    a31aeb8175a87125faf568f93bdb6e2e

  • SHA1

    29ef030ac024991c3142ebd9d614797205bbc061

  • SHA256

    fd63f671c5984fd1cd39cf00e35bf5e978b8dedce3e209d29c120325f1984254

  • SHA512

    0fbe4c479ffcd20f489bdbea36fa11227dad9336f9e4c435ac713447ecb53dab276e54b41c81b981fa970e0323e3b843111918b8847270cee61363dd19210aed

  • SSDEEP

    12288:jFlLKHFjcsqUWf5K5mGfJG7ywneuPwHPKsOZESo1k0T6oKY0+We78rziR7/quUWh:Jf5KmGLVuPwHysOZkwoKY0+Wc8fW26h

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/chime/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fd63f671c5984fd1cd39cf00e35bf5e978b8dedce3e209d29c120325f1984254

    • Size

      752KB

    • MD5

      a31aeb8175a87125faf568f93bdb6e2e

    • SHA1

      29ef030ac024991c3142ebd9d614797205bbc061

    • SHA256

      fd63f671c5984fd1cd39cf00e35bf5e978b8dedce3e209d29c120325f1984254

    • SHA512

      0fbe4c479ffcd20f489bdbea36fa11227dad9336f9e4c435ac713447ecb53dab276e54b41c81b981fa970e0323e3b843111918b8847270cee61363dd19210aed

    • SSDEEP

      12288:jFlLKHFjcsqUWf5K5mGfJG7ywneuPwHPKsOZESo1k0T6oKY0+We78rziR7/quUWh:Jf5KmGLVuPwHysOZkwoKY0+Wc8fW26h

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks