General

  • Target

    tmp

  • Size

    204KB

  • Sample

    230327-mklghsda39

  • MD5

    771ceef25e513ae88bda595e5e3b08df

  • SHA1

    5b83d32288a62b47f202676189be3831f16a9ffa

  • SHA256

    5408bf54a92e5997a90cdae006b6ef9b42b8654e0341ddfb36aece278ca45204

  • SHA512

    76872f6cd0c36f75fd772f31c8fa93edd4de3624d8c61e7aad6f4b1d21535012801e2b4ddf9766869d5f7c30ca9fcd342103724ee070a2ce27afd661949bb09a

  • SSDEEP

    3072:3fY/TU9fE9PEtu7b/LLpVjntkPrzNAK/secbtSUEUbOlXxVI6QJSBi+5AQqY84ka:vYa6tvpVKrpPkNLaOfJSb57qt4GWN

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/irem/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      tmp

    • Size

      204KB

    • MD5

      771ceef25e513ae88bda595e5e3b08df

    • SHA1

      5b83d32288a62b47f202676189be3831f16a9ffa

    • SHA256

      5408bf54a92e5997a90cdae006b6ef9b42b8654e0341ddfb36aece278ca45204

    • SHA512

      76872f6cd0c36f75fd772f31c8fa93edd4de3624d8c61e7aad6f4b1d21535012801e2b4ddf9766869d5f7c30ca9fcd342103724ee070a2ce27afd661949bb09a

    • SSDEEP

      3072:3fY/TU9fE9PEtu7b/LLpVjntkPrzNAK/secbtSUEUbOlXxVI6QJSBi+5AQqY84ka:vYa6tvpVKrpPkNLaOfJSb57qt4GWN

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks