General

  • Target

    PO 00234.zip

  • Size

    542KB

  • Sample

    230606-qhsdtsdg69

  • MD5

    0d1a6209704cddb135abbc85bfba2dc1

  • SHA1

    815df974a1b4af8a2a3521cfd66b73eda22fbe1c

  • SHA256

    d65c56de4ba43127d338477f64ebfde03afc406b3142e25f30d54900398b4521

  • SHA512

    e463c44a4980f80f590a192ca0b8febc17e9e129418e8bee02afa2e5e49fe33496ac020909c209d67a3065ac115fadc65ac10835a519a7c83fe72ea295ca8cb7

  • SSDEEP

    12288:v3B2iSnpd6lw/9qGU5hi2eM8IO9Wc6E52a9CfqdoiYpkElskMINcJwlNL:vB1SnpN9qnh+ToKaS6N/NcGz

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO 00234.exe

    • Size

      616KB

    • MD5

      710d9ff3b02313f81c0ea6679a219c5c

    • SHA1

      0a14506262914b6d5a502fd407d2ca36244d2ede

    • SHA256

      ddbe6aa81458808ff4ffb464a0871f0cde3e69fee90004625029ad882fc77525

    • SHA512

      3c3130fe622605ff67cb640f94be03d416f5e9637b3432cb33a3db14ab6c1f4d363abd12258a5d2fbdc6acad595c8b262fbcb3605c4541eba0f35db008abb3b4

    • SSDEEP

      12288:ssIdul2iNfmFx2iqNhujGjU7eK6H0rvoCT81qCYdoC89GWlsWc1A+l:ssIdul1lmFxU06H0cr5MqPlP+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks