General

  • Target

    PO.zip

  • Size

    478KB

  • Sample

    230605-tmdm1saa9v

  • MD5

    203ccb260915b852d430bf3a4e0eaa73

  • SHA1

    9f7a0fdfbf07b84900d79ab474a2d6ff26604c1e

  • SHA256

    c5f372e3bf6e6744435d474df4b5a16e49c611519bf0977b0c077b3a7dc7847a

  • SHA512

    751d1473a411e27e07507ebb159126d0a1ef6bd067bc4837172d2f44a7e5250812ecb485eb5854492127438d0b6092b65aa79d02156249cb3063c46decb98652

  • SSDEEP

    12288:qLl4wjrZgO7JCzRJKpV/AXVEbsjA5ML/Mzp5M9BMO:qewj9JCzXyV/AXVD/M1y9BX

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO.exe

    • Size

      624KB

    • MD5

      461435a0209320befa140d18ed5db575

    • SHA1

      d858aa46e07657eb836cb554d86710a5ca6d4cc1

    • SHA256

      e523dd1e51303c2be9fe5cccef1960524a5b6de9bb2aeab9e4e4cfc94c86db32

    • SHA512

      1bfbede6ae8f178a60b46c1f9a01025b0e9f100b01a17fc67bffd10992d1c85af58e0a32df00052a6c3acab4019045fae0b9ec9226f756ebbeb30d0c5c175a80

    • SSDEEP

      12288:PvV+s1bSQT6tjjdB40qlhueo7lCDRLKRQksHjVRJEaLx6sohHZBgqWwzAi:PtpDuewlCDlwzIjJEkxHc5J

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks