General

  • Target

    7a02814906748b9a476d956043244624.exe

  • Size

    528KB

  • Sample

    230425-g8cavsag2w

  • MD5

    7a02814906748b9a476d956043244624

  • SHA1

    a790e7e90e51e70fe845cf05969f9c575cbe29cb

  • SHA256

    c830b8b6620385f0f7d3b090f4c38809d7ac37f013b9c1687e39e80564cc445d

  • SHA512

    dd874334d268521953ba9a3df192a362ac0f88d7f8fe48d193d3001dd2a2ac319676ccc3cd2f848a763ac1055392897eaf2b98d41988cf7c26a1160f4a3f188a

  • SSDEEP

    6144:+CKlI73PTbLu7lW++tFLBT6PaDHiPXrjGgKb8LIkzV6r1kZ47pBaRpewP8SCCZTU:+CKI3PDuX+ttBmP2YXegYreQ18Gha4

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/donpy/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7a02814906748b9a476d956043244624.exe

    • Size

      528KB

    • MD5

      7a02814906748b9a476d956043244624

    • SHA1

      a790e7e90e51e70fe845cf05969f9c575cbe29cb

    • SHA256

      c830b8b6620385f0f7d3b090f4c38809d7ac37f013b9c1687e39e80564cc445d

    • SHA512

      dd874334d268521953ba9a3df192a362ac0f88d7f8fe48d193d3001dd2a2ac319676ccc3cd2f848a763ac1055392897eaf2b98d41988cf7c26a1160f4a3f188a

    • SSDEEP

      6144:+CKlI73PTbLu7lW++tFLBT6PaDHiPXrjGgKb8LIkzV6r1kZ47pBaRpewP8SCCZTU:+CKI3PDuX+ttBmP2YXegYreQ18Gha4

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks