General

  • Target

    cZI4g6MVyFrAaaS.exe

  • Size

    720KB

  • Sample

    230328-b6y4ysab81

  • MD5

    cef8817f7191e334237f0a967fddc624

  • SHA1

    26ea81d3dea973f4744c0ff1ab355b6e9d85872f

  • SHA256

    11b8ec17c90add99a6e717e3f90640dcbfef63c3b4185c872caea70841bd74f2

  • SHA512

    8057ccb69d1afba9006d5b767b801193311edb97afb7f3b6f994a4d415fb63baa25178623a9d9c3b9cac0929258c1eb2553a16ba66c6fa4605cd6f0fb069012a

  • SSDEEP

    12288:d6SKdJVZz5dlkJcr62F3bcE+ff0dPx0t1hp4ZGyjgJlOmP:g1VZ9vs2F3bxXdPStLuZfaO

Malware Config

Extracted

Family

lokibot

C2

http://64.227.48.212/?page_id=49156044

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      cZI4g6MVyFrAaaS.exe

    • Size

      720KB

    • MD5

      cef8817f7191e334237f0a967fddc624

    • SHA1

      26ea81d3dea973f4744c0ff1ab355b6e9d85872f

    • SHA256

      11b8ec17c90add99a6e717e3f90640dcbfef63c3b4185c872caea70841bd74f2

    • SHA512

      8057ccb69d1afba9006d5b767b801193311edb97afb7f3b6f994a4d415fb63baa25178623a9d9c3b9cac0929258c1eb2553a16ba66c6fa4605cd6f0fb069012a

    • SSDEEP

      12288:d6SKdJVZz5dlkJcr62F3bcE+ff0dPx0t1hp4ZGyjgJlOmP:g1VZ9vs2F3bxXdPStLuZfaO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks