General

  • Target

    Suppliers registration form.zip

  • Size

    542KB

  • Sample

    230606-qhsdtsec8x

  • MD5

    b4f1b4ec9732645c73e73261815a2d88

  • SHA1

    5922ed5ddf4a62322d0909de47ef0034ed487eae

  • SHA256

    c168fbe77b50db29e162c513bd6ab692d4a2592b098f17fd4a12a117b207a5c3

  • SHA512

    987b2939cb32d768f95790ac5853fe09801f2335a412da74b8355ba92016c1b59ce3d0ed4300d802c159b72736c7cfb1a1c15001f446aa7044058f05b1bcdeca

  • SSDEEP

    12288:e3B2iSnpd6lw/9qGU5hi2eM8IO9Wc6E52a9CfqdoiYpkElskMINcJwlNg:2B1SnpN9qnh+ToKaS6N/NcGo

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Suppliers registration form.exe

    • Size

      616KB

    • MD5

      710d9ff3b02313f81c0ea6679a219c5c

    • SHA1

      0a14506262914b6d5a502fd407d2ca36244d2ede

    • SHA256

      ddbe6aa81458808ff4ffb464a0871f0cde3e69fee90004625029ad882fc77525

    • SHA512

      3c3130fe622605ff67cb640f94be03d416f5e9637b3432cb33a3db14ab6c1f4d363abd12258a5d2fbdc6acad595c8b262fbcb3605c4541eba0f35db008abb3b4

    • SSDEEP

      12288:ssIdul2iNfmFx2iqNhujGjU7eK6H0rvoCT81qCYdoC89GWlsWc1A+l:ssIdul1lmFxU06H0cr5MqPlP+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks