General

  • Target

    TNT Receipt_89293076641.exe

  • Size

    648KB

  • Sample

    230530-jlehtage6s

  • MD5

    be0d1363e8095407fe92c505c515bf5e

  • SHA1

    21ce303cca5639c9fe5c342ae3dd90c63096ef82

  • SHA256

    97f4b5ad674795f80179444016df17a455ed6ecfdea1639550a1bba5a1ffaab8

  • SHA512

    6cf390ad5b8918973f12f07e8fe692fc535b2b8eebda24b0a6c62ddfeee680923c94776a4faa933d6b16dbfe0ab25f1e1b4ccb83c625f4ecfe7489b12c8670e6

  • SSDEEP

    12288:PRP2B0xTGlxNqvNu2hZ+nUEsn9BzuGxZdrNc2IqzYBEGqCWkzQ5hgYfr8CBwZ+fb:ZPLaVUH999BzCGhHkzQ5aYu+fb

Malware Config

Extracted

Family

lokibot

C2

http://161.35.102.56/~nikol/?p=55734886

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      TNT Receipt_89293076641.exe

    • Size

      648KB

    • MD5

      be0d1363e8095407fe92c505c515bf5e

    • SHA1

      21ce303cca5639c9fe5c342ae3dd90c63096ef82

    • SHA256

      97f4b5ad674795f80179444016df17a455ed6ecfdea1639550a1bba5a1ffaab8

    • SHA512

      6cf390ad5b8918973f12f07e8fe692fc535b2b8eebda24b0a6c62ddfeee680923c94776a4faa933d6b16dbfe0ab25f1e1b4ccb83c625f4ecfe7489b12c8670e6

    • SSDEEP

      12288:PRP2B0xTGlxNqvNu2hZ+nUEsn9BzuGxZdrNc2IqzYBEGqCWkzQ5hgYfr8CBwZ+fb:ZPLaVUH999BzCGhHkzQ5aYu+fb

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks