General

  • Target

    d94d4ff9589037731d7dfb4d9e582b0b.exe

  • Size

    852KB

  • Sample

    230320-nmp36adc45

  • MD5

    d94d4ff9589037731d7dfb4d9e582b0b

  • SHA1

    aedce0d7805f622d154e85b4dc214df74a461262

  • SHA256

    3d86b5dcc6c73bea0dc3acf9ec976debcffb74a428c785120a1d1f02618e827a

  • SHA512

    f075b3720f14cca77c9cdba11f8374ef105091ab46991c56d605da7c39c0e8bcf24b6a03f9a979a1ffeee62ee8df3b7746f78c789328b16bea52607596a2ec8b

  • SSDEEP

    12288:PbicmhVDQcFra/2DOVa0hCHU49ocJEEG7BiPvrjo1zR3:2FrFra/KbU8o0G7BinrM1

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/fresh/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d94d4ff9589037731d7dfb4d9e582b0b.exe

    • Size

      852KB

    • MD5

      d94d4ff9589037731d7dfb4d9e582b0b

    • SHA1

      aedce0d7805f622d154e85b4dc214df74a461262

    • SHA256

      3d86b5dcc6c73bea0dc3acf9ec976debcffb74a428c785120a1d1f02618e827a

    • SHA512

      f075b3720f14cca77c9cdba11f8374ef105091ab46991c56d605da7c39c0e8bcf24b6a03f9a979a1ffeee62ee8df3b7746f78c789328b16bea52607596a2ec8b

    • SSDEEP

      12288:PbicmhVDQcFra/2DOVa0hCHU49ocJEEG7BiPvrjo1zR3:2FrFra/KbU8o0G7BinrM1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks