General

  • Target

    fund transfer.zip

  • Size

    529KB

  • Sample

    230606-j5vzxadc7z

  • MD5

    6eceb7417321e5af21e101b4c3c6fce4

  • SHA1

    72df66effeb82f190ffd3fc08f17a9dea9e9699f

  • SHA256

    283bae702fe2d684e28a4847cf259e3aa2d2d52e37774239d8a980033c6da5c9

  • SHA512

    dcc88e9d2d96e538f5697cdefec3ad389aa2a9256542d0efd3538cb9cca04f6d996d42bbdcfa90074bd81737be0c0c5821d4d043f8e416d6f4c37ce8c94a4f7f

  • SSDEEP

    12288:qCL/T8SjsvpHfO666L3qX+DfNI5xrUG6UgZMBckueQ:pvLsvlm0zN+gZMSDb

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fund transfer.exe

    • Size

      596KB

    • MD5

      908cfdbd7db0913e3879582f0a3814c1

    • SHA1

      c2e0f2f52b4b7c4b9df5999ec4b0920c1d1920c7

    • SHA256

      e955fc3741fe1809aa1c2ac006e8a64e9db41e666554e69e426111926c30d3f4

    • SHA512

      cf7f4a91300135740497c0f23d53654fac450ace75e9b54e02a268f570e68209d562c55493e8326f144c66b282b7b3cf3c933735efe9ea61d1fc8b16918f1f32

    • SSDEEP

      12288:oKS7z5GoJiGaq5auNhXpjNsJ17UY6Zs6wMi9IvvEm5/Lp:s5GoR5aEHjNpwMi96vEazp

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks