General

  • Target

    DHL Express Receipt_pdf.exe

  • Size

    718KB

  • Sample

    230505-13rcdahb61

  • MD5

    0dc8386c4e396309a092d7bc21241fca

  • SHA1

    711c4b75be58ff9e7baa832d5bb93469f9fe5d53

  • SHA256

    d648b91e497bc62670602ae9cf08df7d4bab7bdee902b0db3b6e308b91ad34a1

  • SHA512

    6c942ca08125c4e8030629d9c1846ca5bba001108dcec4e6548bba1f479ea0496b460cb15d1a94f061148db56d144912ced9105d2de7502f8d7e731bb95d1e38

  • SSDEEP

    12288:yBg8iz0xPmaT1/iVZsv6BJXajCye+JLS5btzs8QqAcoUj0Eb3:ymd0xuaT1/8sUJXXye+JLS9t4IAcoUj9

Malware Config

Extracted

Family

lokibot

C2

http://104.156.227.195/~blog/?p=369572314317708

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DHL Express Receipt_pdf.exe

    • Size

      718KB

    • MD5

      0dc8386c4e396309a092d7bc21241fca

    • SHA1

      711c4b75be58ff9e7baa832d5bb93469f9fe5d53

    • SHA256

      d648b91e497bc62670602ae9cf08df7d4bab7bdee902b0db3b6e308b91ad34a1

    • SHA512

      6c942ca08125c4e8030629d9c1846ca5bba001108dcec4e6548bba1f479ea0496b460cb15d1a94f061148db56d144912ced9105d2de7502f8d7e731bb95d1e38

    • SSDEEP

      12288:yBg8iz0xPmaT1/iVZsv6BJXajCye+JLS5btzs8QqAcoUj0Eb3:ymd0xuaT1/8sUJXXye+JLS9t4IAcoUj9

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks