General

  • Target

    DOCSZOE23050007_pdf.exe

  • Size

    925KB

  • Sample

    230523-qws8aagc9z

  • MD5

    2802ed78b53811feedcec153eb8aec22

  • SHA1

    52b9086f87e0b36179fd7f12fff108114ec70d4a

  • SHA256

    5ddec8118b1cafd72d1a28420cc8e7979a3c75d5847c1148358be9a454261aa2

  • SHA512

    f35d10a9a66e17749e53737c10c1c661941390295b993a09cf65e5e914402fcd8409f943deea73b6c63437dbb718b21a2919c1737c2af33f6d42c457b86d3a58

  • SSDEEP

    12288:BQ2iNuLpNaPn0YPX/NBXibHqfra32aq7wZpd1k/UVlwb77oY6LXELYteAWXdfbbw:C1RP08SbHqrC2H7inyMVM78lP

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/fresh1/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DOCSZOE23050007_pdf.exe

    • Size

      925KB

    • MD5

      2802ed78b53811feedcec153eb8aec22

    • SHA1

      52b9086f87e0b36179fd7f12fff108114ec70d4a

    • SHA256

      5ddec8118b1cafd72d1a28420cc8e7979a3c75d5847c1148358be9a454261aa2

    • SHA512

      f35d10a9a66e17749e53737c10c1c661941390295b993a09cf65e5e914402fcd8409f943deea73b6c63437dbb718b21a2919c1737c2af33f6d42c457b86d3a58

    • SSDEEP

      12288:BQ2iNuLpNaPn0YPX/NBXibHqfra32aq7wZpd1k/UVlwb77oY6LXELYteAWXdfbbw:C1RP08SbHqrC2H7inyMVM78lP

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks