General

  • Target

    5e627eb287e1a5b9bd3a008099b060ee.exe

  • Size

    615KB

  • Sample

    230418-ryj8tsdg8y

  • MD5

    5e627eb287e1a5b9bd3a008099b060ee

  • SHA1

    c3c15c85bd5512725b550b6ad74b514e3b8cb1bc

  • SHA256

    5a9397f2ec2a6609708ad1bbbff41e1d6d099d863d0714003d35070be9786edd

  • SHA512

    febcd716fe096afdbc2dc6c560fcb40ffc1af108c86461a03c28e6362f8e312fde5621926ee0d671fd6dd4810d6ddf0f899d2ed2dcf3144f48ad30de1895eb1f

  • SSDEEP

    12288:7g+boi1HIWpfJoTGkhamJzSRYHSWThzXPkdO:M0HIrT7daYHhzsg

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/donpy/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5e627eb287e1a5b9bd3a008099b060ee.exe

    • Size

      615KB

    • MD5

      5e627eb287e1a5b9bd3a008099b060ee

    • SHA1

      c3c15c85bd5512725b550b6ad74b514e3b8cb1bc

    • SHA256

      5a9397f2ec2a6609708ad1bbbff41e1d6d099d863d0714003d35070be9786edd

    • SHA512

      febcd716fe096afdbc2dc6c560fcb40ffc1af108c86461a03c28e6362f8e312fde5621926ee0d671fd6dd4810d6ddf0f899d2ed2dcf3144f48ad30de1895eb1f

    • SSDEEP

      12288:7g+boi1HIWpfJoTGkhamJzSRYHSWThzXPkdO:M0HIrT7daYHhzsg

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks