General

  • Target

    -BL.zip

  • Size

    529KB

  • Sample

    230606-ld6y7sde4y

  • MD5

    201bea96b35417eaa307e4e27f9ef6b1

  • SHA1

    8b9e26358b2669bb78b1e6cf5bf5418c6552cc0b

  • SHA256

    02919eb98aac0c297956add4d27d7a77ec585e9b8b5476d305c13be09dab1984

  • SHA512

    af12a9853a8638badd4f5084b26f44da96fa76d157da6567df55a1cde1120718db79fc5d9ddc5834a8b3b59a9d324b2c67b378af932dd42e8a6edd640117f761

  • SSDEEP

    12288:LCL/T8SjsvpHfO666L3qX+DfNI5xrUG6UgZMBckuer:+vLsvlm0zN+gZMSDw

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      -BL.exe

    • Size

      596KB

    • MD5

      908cfdbd7db0913e3879582f0a3814c1

    • SHA1

      c2e0f2f52b4b7c4b9df5999ec4b0920c1d1920c7

    • SHA256

      e955fc3741fe1809aa1c2ac006e8a64e9db41e666554e69e426111926c30d3f4

    • SHA512

      cf7f4a91300135740497c0f23d53654fac450ace75e9b54e02a268f570e68209d562c55493e8326f144c66b282b7b3cf3c933735efe9ea61d1fc8b16918f1f32

    • SSDEEP

      12288:oKS7z5GoJiGaq5auNhXpjNsJ17UY6Zs6wMi9IvvEm5/Lp:s5GoR5aEHjNpwMi96vEazp

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks