General

  • Target

    Purchase Order No.PU2-PO-306.exe

  • Size

    538KB

  • Sample

    230509-je8hbaeg55

  • MD5

    4d1362bc10de87539d1d367279f40b3f

  • SHA1

    49c8766d147f050a4d788f165cf003cd6b16ba36

  • SHA256

    50b98481af6d01585e639143040a43d067403bc84511267fc4ea965966a9f1d1

  • SHA512

    fa56f226079af919eb5dc834c86ea5fcffe996afb3e7d2cfe7cb0504ec60d17ea455ebbe944c57c2bb7200330e9bfa2855f188cf383e0ab8247b77a6e387d00f

  • SSDEEP

    12288:WNj5AytR4U2MuUO/Z0qesbUGsnAqH4h0tFHp8hL1IdLiEs:W3HRiT0BsgnAqH60tBuhONiEs

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.148/blessedjay/five/fre,php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Purchase Order No.PU2-PO-306.exe

    • Size

      538KB

    • MD5

      4d1362bc10de87539d1d367279f40b3f

    • SHA1

      49c8766d147f050a4d788f165cf003cd6b16ba36

    • SHA256

      50b98481af6d01585e639143040a43d067403bc84511267fc4ea965966a9f1d1

    • SHA512

      fa56f226079af919eb5dc834c86ea5fcffe996afb3e7d2cfe7cb0504ec60d17ea455ebbe944c57c2bb7200330e9bfa2855f188cf383e0ab8247b77a6e387d00f

    • SSDEEP

      12288:WNj5AytR4U2MuUO/Z0qesbUGsnAqH4h0tFHp8hL1IdLiEs:W3HRiT0BsgnAqH60tBuhONiEs

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks