General

  • Target

    fund transfer.exe

  • Size

    596KB

  • Sample

    230606-jsd6macf38

  • MD5

    908cfdbd7db0913e3879582f0a3814c1

  • SHA1

    c2e0f2f52b4b7c4b9df5999ec4b0920c1d1920c7

  • SHA256

    e955fc3741fe1809aa1c2ac006e8a64e9db41e666554e69e426111926c30d3f4

  • SHA512

    cf7f4a91300135740497c0f23d53654fac450ace75e9b54e02a268f570e68209d562c55493e8326f144c66b282b7b3cf3c933735efe9ea61d1fc8b16918f1f32

  • SSDEEP

    12288:oKS7z5GoJiGaq5auNhXpjNsJ17UY6Zs6wMi9IvvEm5/Lp:s5GoR5aEHjNpwMi96vEazp

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fund transfer.exe

    • Size

      596KB

    • MD5

      908cfdbd7db0913e3879582f0a3814c1

    • SHA1

      c2e0f2f52b4b7c4b9df5999ec4b0920c1d1920c7

    • SHA256

      e955fc3741fe1809aa1c2ac006e8a64e9db41e666554e69e426111926c30d3f4

    • SHA512

      cf7f4a91300135740497c0f23d53654fac450ace75e9b54e02a268f570e68209d562c55493e8326f144c66b282b7b3cf3c933735efe9ea61d1fc8b16918f1f32

    • SSDEEP

      12288:oKS7z5GoJiGaq5auNhXpjNsJ17UY6Zs6wMi9IvvEm5/Lp:s5GoR5aEHjNpwMi96vEazp

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks