General

  • Target

    894cd5c6a63bd35486dd0e8e51a7562a8abd6655d405a588dfedc262b2d3713f

  • Size

    619KB

  • Sample

    230503-lck1caeb62

  • MD5

    959be48362a0ea1e909a8c5bceeeeb51

  • SHA1

    8ab780ffcb18d9541be1dcadec306c6888c7768a

  • SHA256

    894cd5c6a63bd35486dd0e8e51a7562a8abd6655d405a588dfedc262b2d3713f

  • SHA512

    ef15e3ed5418e06f71cc3e65f51144aefe3a3c9abfbe03192b6cc9a01693c69bec5c938140b10ed5b0157864e2f3c3da1b0085f54fc77fb58dc8c27796c02478

  • SSDEEP

    12288:jzni4Iy/u8q57SoXnJpmJG05vdb1xMZAIoWof0q:jzg57SSQDoAIoWr

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.60/petercody/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      894cd5c6a63bd35486dd0e8e51a7562a8abd6655d405a588dfedc262b2d3713f

    • Size

      619KB

    • MD5

      959be48362a0ea1e909a8c5bceeeeb51

    • SHA1

      8ab780ffcb18d9541be1dcadec306c6888c7768a

    • SHA256

      894cd5c6a63bd35486dd0e8e51a7562a8abd6655d405a588dfedc262b2d3713f

    • SHA512

      ef15e3ed5418e06f71cc3e65f51144aefe3a3c9abfbe03192b6cc9a01693c69bec5c938140b10ed5b0157864e2f3c3da1b0085f54fc77fb58dc8c27796c02478

    • SSDEEP

      12288:jzni4Iy/u8q57SoXnJpmJG05vdb1xMZAIoWof0q:jzg57SSQDoAIoWr

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks