General

  • Target

    -Certificate of analysis.zip

  • Size

    529KB

  • Sample

    230606-ld6y7sde4z

  • MD5

    a58041a6de11c6d6b5ca70242bd1cd48

  • SHA1

    0ab9dbe7320cd7dfca7e5621d88df8b435b850a1

  • SHA256

    098b375757bbdec539dd924e40b691a5677a47a4f0d4dd6a9ed80e867623ba22

  • SHA512

    49f3df6287021f4bbcdadae1423504c7ff61bcf89b780d122c02f881a769bfa21e212f197dc4da77a399ca253194432c8f26d1120067e674839bb58e83f811a3

  • SSDEEP

    12288:gCL/T8SjsvpHfO666L3qX+DfNI5xrUG6UgZMBckuey:jvLsvlm0zN+gZMSDH

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      -Certificate of analysis.exe

    • Size

      596KB

    • MD5

      908cfdbd7db0913e3879582f0a3814c1

    • SHA1

      c2e0f2f52b4b7c4b9df5999ec4b0920c1d1920c7

    • SHA256

      e955fc3741fe1809aa1c2ac006e8a64e9db41e666554e69e426111926c30d3f4

    • SHA512

      cf7f4a91300135740497c0f23d53654fac450ace75e9b54e02a268f570e68209d562c55493e8326f144c66b282b7b3cf3c933735efe9ea61d1fc8b16918f1f32

    • SSDEEP

      12288:oKS7z5GoJiGaq5auNhXpjNsJ17UY6Zs6wMi9IvvEm5/Lp:s5GoR5aEHjNpwMi96vEazp

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks