General

  • Target

    f5f266dc641ff0991027fb2c539423a86db1a2cbb8b8c57d0d628a0b13bafc86.zip

  • Size

    644KB

  • Sample

    230310-ngf83adc25

  • MD5

    1c183b8f830b069b450b64621f77e62e

  • SHA1

    bfeaa3c994468266e5cc2b7292e460cfb05b961e

  • SHA256

    7b896b29a4c74139392c1e15582f4a0f5d5e7eac2a1c4368f77567b473524c9c

  • SHA512

    5030316b214600038cdc718fbbe90c1ee404d10492e69658feb202ca780ddc86786a112c43c8e94e64e1ffbccf47efad410ced86dc0990f7d7167720307e98c6

  • SSDEEP

    12288:SvFLO82RFZ9RKh/xEMpgxKBMxLj/IFtblGdeosMGaxtqcxPw3KtRmTtLvP:eFLj2w/JpgxLxLjAFtbsdeFMbLqOPwaI

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f5f266dc641ff0991027fb2c539423a86db1a2cbb8b8c57d0d628a0b13bafc86.exe

    • Size

      792KB

    • MD5

      22d3492caf8b99c776b334b22450094e

    • SHA1

      14268177336380e718bfe938de8efd004fc12a41

    • SHA256

      f5f266dc641ff0991027fb2c539423a86db1a2cbb8b8c57d0d628a0b13bafc86

    • SHA512

      7f773e38ac8afefb6b570c95a1fd81769027e256ec0cd2965cf5392bff33de27db04ce3d45fa4037ea4d2bc49b35001aa120de11bd615157040c2aeaf6565240

    • SSDEEP

      24576:ia/5u61vgw6VThgJsaAOCsilDhGfRsSX:vtgdT6Jf8DXGfK

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks