General

  • Target

    bf136bd0d7568d3db33aede1e943caea.exe

  • Size

    624KB

  • Sample

    230505-x14cdagh52

  • MD5

    bf136bd0d7568d3db33aede1e943caea

  • SHA1

    73167832a6b1cc08fc605b8fc5045ff54331c73f

  • SHA256

    3f22bd2e20b994c404cdc3fd87820817b32c3471d003c3156186ecac22936022

  • SHA512

    026c54ae5c7cca5362528b309bd5914cdb06c2fde62df8ac0c62a834c6501109436abdfd8353934e4f2d2830f74268f0592b14564a580c95a2b8b6729cc91a68

  • SSDEEP

    12288:31ni4IycA7XRrWBkz0eSZ0fso2f96VgCf/v9+pM6DkqkvB:31kG8CzXKe32qv/vopMwkqi

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.60/petercody/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      bf136bd0d7568d3db33aede1e943caea.exe

    • Size

      624KB

    • MD5

      bf136bd0d7568d3db33aede1e943caea

    • SHA1

      73167832a6b1cc08fc605b8fc5045ff54331c73f

    • SHA256

      3f22bd2e20b994c404cdc3fd87820817b32c3471d003c3156186ecac22936022

    • SHA512

      026c54ae5c7cca5362528b309bd5914cdb06c2fde62df8ac0c62a834c6501109436abdfd8353934e4f2d2830f74268f0592b14564a580c95a2b8b6729cc91a68

    • SSDEEP

      12288:31ni4IycA7XRrWBkz0eSZ0fso2f96VgCf/v9+pM6DkqkvB:31kG8CzXKe32qv/vopMwkqi

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks