General

  • Target

    FedEx Shipping Documents.exe

  • Size

    617KB

  • Sample

    230525-gzbyqsgc89

  • MD5

    1c57a9e41ca9b9e64fb33470facd087e

  • SHA1

    1929dc10880f028c83ffaef8693b54fe383f0fb0

  • SHA256

    00cf6e9a873007d1f11859d3e30c85bda6f137cfbc53cd0bc9a4ac77a6ad5b04

  • SHA512

    bc0fd39be1fe839be06618e5bda37bbea55556768279d6d918209a104b932024d63a38dcfdedcd23fa80f4e609ef494f7d2dca18b1262fa1d38f7746218c4520

  • SSDEEP

    12288:taWIm6lVvtzZBEP85VdbHPWF07ViMLRZOYKWnId5a/VAV9Cai2b:MTmIt9BEP8TdtUMLRZnKWnIdSQ

Malware Config

Extracted

Family

lokibot

C2

http://161.35.102.56/~nikol/?p=143606594

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      FedEx Shipping Documents.exe

    • Size

      617KB

    • MD5

      1c57a9e41ca9b9e64fb33470facd087e

    • SHA1

      1929dc10880f028c83ffaef8693b54fe383f0fb0

    • SHA256

      00cf6e9a873007d1f11859d3e30c85bda6f137cfbc53cd0bc9a4ac77a6ad5b04

    • SHA512

      bc0fd39be1fe839be06618e5bda37bbea55556768279d6d918209a104b932024d63a38dcfdedcd23fa80f4e609ef494f7d2dca18b1262fa1d38f7746218c4520

    • SSDEEP

      12288:taWIm6lVvtzZBEP85VdbHPWF07ViMLRZOYKWnId5a/VAV9Cai2b:MTmIt9BEP8TdtUMLRZnKWnIdSQ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks