General

  • Target

    cluton.exe

  • Size

    282KB

  • Sample

    230316-h6gy1abh9w

  • MD5

    173cc49904c607c514e2f4a2054aaca0

  • SHA1

    0b185b7649c50d06a5d115a210aa3496abf445c2

  • SHA256

    985d2a5f97ed03ae735c7f30f950846339d5fce5c18491326edec9a8be5cc509

  • SHA512

    f2a83903311969c96aa44df504e9c8118fb2be0a46058502da744ab4790c476e36474ec856afc8a70d599e11df319597d0998f7f9d9e0751899eac92fe567624

  • SSDEEP

    3072:1BkfJpRXATwMdFCcJKTTGoE+l4lPRQ4aKhyLd1bWqf20AoZbwh8LsZU2z0Ai1:1qjITj9RQ4aKhSnf1AoZgqV1

Malware Config

Extracted

Family

lokibot

C2

http://bauxx.xyz/mtk1/w2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      cluton.exe

    • Size

      282KB

    • MD5

      173cc49904c607c514e2f4a2054aaca0

    • SHA1

      0b185b7649c50d06a5d115a210aa3496abf445c2

    • SHA256

      985d2a5f97ed03ae735c7f30f950846339d5fce5c18491326edec9a8be5cc509

    • SHA512

      f2a83903311969c96aa44df504e9c8118fb2be0a46058502da744ab4790c476e36474ec856afc8a70d599e11df319597d0998f7f9d9e0751899eac92fe567624

    • SSDEEP

      3072:1BkfJpRXATwMdFCcJKTTGoE+l4lPRQ4aKhyLd1bWqf20AoZbwh8LsZU2z0Ai1:1qjITj9RQ4aKhSnf1AoZgqV1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks