General

  • Target

    4611965d6a267d9d868bab2690f0a533.exe

  • Size

    681KB

  • Sample

    230505-wzkcfacg56

  • MD5

    4611965d6a267d9d868bab2690f0a533

  • SHA1

    ef3102bbd4566aac1aaca456c9e8b8189f85f372

  • SHA256

    19af5e15b1e1e9b6eb90f2a93f290ae53cb2ebdee29f972cfb3bf9e9dc38444e

  • SHA512

    130546fcb2cd1bae158863b299bc3b26a2ed3979e8a98ab0f8b2e08e7a66edf6cac1674f264ed1da27871f803c14f21124cb0a6b370973967e81ed69c7d42b85

  • SSDEEP

    12288:FbkcdXHwni4IyS+zWexwpY7F3qHZzjpZTNvkIk+ECk0Haz:FbJNwLTxwlzFpxwHCk06

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.60/petercody/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4611965d6a267d9d868bab2690f0a533.exe

    • Size

      681KB

    • MD5

      4611965d6a267d9d868bab2690f0a533

    • SHA1

      ef3102bbd4566aac1aaca456c9e8b8189f85f372

    • SHA256

      19af5e15b1e1e9b6eb90f2a93f290ae53cb2ebdee29f972cfb3bf9e9dc38444e

    • SHA512

      130546fcb2cd1bae158863b299bc3b26a2ed3979e8a98ab0f8b2e08e7a66edf6cac1674f264ed1da27871f803c14f21124cb0a6b370973967e81ed69c7d42b85

    • SSDEEP

      12288:FbkcdXHwni4IyS+zWexwpY7F3qHZzjpZTNvkIk+ECk0Haz:FbJNwLTxwlzFpxwHCk06

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks