General

  • Target

    FedexShippingDocument.exe

  • Size

    509KB

  • Sample

    230505-zfrh7agb41

  • MD5

    1d61dcf6eb7607c4bde5a4cc793fa816

  • SHA1

    0a6d23d164483b7665f39727133b01d890a4019b

  • SHA256

    89a061946525216eb7a324c3e174cb8ed1bbbd139647ba16844ffe8feb22c8d1

  • SHA512

    1740a15f265bf0099a1e380958e0e1f2f87332913c9334104d176a5f6f5f8c0ee4ccf712a576e6e31f6c7ba530a730c2b04bb212fe26819c208d430ab0abd3ca

  • SSDEEP

    12288:e+WXS4qn+TiQUSfF2vitpD/ci/pL0DgrQcsWZ6wpeeO:eBPFMiHRd/Qp4pO

Malware Config

Extracted

Family

lokibot

C2

http://104.156.227.195/~blog/?p=70927

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      FedexShippingDocument.exe

    • Size

      509KB

    • MD5

      1d61dcf6eb7607c4bde5a4cc793fa816

    • SHA1

      0a6d23d164483b7665f39727133b01d890a4019b

    • SHA256

      89a061946525216eb7a324c3e174cb8ed1bbbd139647ba16844ffe8feb22c8d1

    • SHA512

      1740a15f265bf0099a1e380958e0e1f2f87332913c9334104d176a5f6f5f8c0ee4ccf712a576e6e31f6c7ba530a730c2b04bb212fe26819c208d430ab0abd3ca

    • SSDEEP

      12288:e+WXS4qn+TiQUSfF2vitpD/ci/pL0DgrQcsWZ6wpeeO:eBPFMiHRd/Qp4pO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks