General

  • Target

    c3a97565b05fae2c36ecd398ab137389.bin

  • Size

    21KB

  • Sample

    230401-b9k2hafb85

  • MD5

    39c2e22db616434fc6364161329fdd2b

  • SHA1

    500b9de99b5b2caf954c8518d7ed82b25eb77b6c

  • SHA256

    ee9c02fcc25ab83443307355ebc4216a9f3afc56a36e51616426b5d7bf758801

  • SHA512

    422914776b4aa8f3961c05edc0cf9cd2248c24bdf4f5c201e785ed263dd0f9547957f86f999c0da5d03eff5f33fd0b71f56eabb47d6c9d6b4455280e8c741a36

  • SSDEEP

    384:8rLoKkyluWAX5dKm2DrrG7u6tkVzXoWeVdED3QjOpn+HpfKWo:Yo8luhPKbrGDKzYWeV6D3iOD

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.148/tallest/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b56a903dfdf14906fd90789b61fd94b7b6c657c436759d192cc32b5d77f8f2f9.vbs

    • Size

      339KB

    • MD5

      c3a97565b05fae2c36ecd398ab137389

    • SHA1

      91b0fcf7ed1552a4c3bf1b234646cf6d0186e9ee

    • SHA256

      b56a903dfdf14906fd90789b61fd94b7b6c657c436759d192cc32b5d77f8f2f9

    • SHA512

      e2bb624b3fe59e6dd83034931aabad0350c21c3167b9310a4cdaab268c7dbb1d1191220ad274e9baa241fccf71613c54d97004493387b0aa261eaf114778371d

    • SSDEEP

      1536:j89r/aDcWJwG0mtvR/Eg5GKFV6UtbOc8GxqsMzcCq:KtZs

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks