General

  • Target

    -INV.zip

  • Size

    529KB

  • Sample

    230606-k2ghsadd8s

  • MD5

    3a815575522def179e50ee205324560f

  • SHA1

    43413824ef35c2bc0ab4734790da047040088a8c

  • SHA256

    367854e346d9ab5453ec6dcb3d67b211f11f3b6ee56f917ccece38f2eb5bfd68

  • SHA512

    ac1b25a175733070dc8200f678200b47aa0c050aa4ff4ba3748c078540a9154e76a49c009248ed432b6baf666652e80f58a502386e7c9c5d5966272a72071a99

  • SSDEEP

    12288:hCL/T8SjsvpHfO666L3qX+DfNI5xrUG6UgZMBckueF:ovLsvlm0zN+gZMSDI

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      -INV.exe

    • Size

      596KB

    • MD5

      908cfdbd7db0913e3879582f0a3814c1

    • SHA1

      c2e0f2f52b4b7c4b9df5999ec4b0920c1d1920c7

    • SHA256

      e955fc3741fe1809aa1c2ac006e8a64e9db41e666554e69e426111926c30d3f4

    • SHA512

      cf7f4a91300135740497c0f23d53654fac450ace75e9b54e02a268f570e68209d562c55493e8326f144c66b282b7b3cf3c933735efe9ea61d1fc8b16918f1f32

    • SSDEEP

      12288:oKS7z5GoJiGaq5auNhXpjNsJ17UY6Zs6wMi9IvvEm5/Lp:s5GoR5aEHjNpwMi96vEazp

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks