General

  • Target

    -INV.zip

  • Size

    542KB

  • Sample

    230606-qhsplaec8y

  • MD5

    50af122af635225e9c237cf0d2cf01c8

  • SHA1

    e353148bd5fa9b4c6a13f6fee0638bd5b01d204d

  • SHA256

    7eb686a51cbb8fd5f9acb2e8d614eda9a504845b402b1d2665d5edc1d6686829

  • SHA512

    415053e42a8976070667307d4a2c7d2d2fc6822bb6b240cde26338dd5d9e1b2c779dc46fd52f7a9d10e3d7f2f659267731fd72fe797a0dcb485d25fc3a7cfb72

  • SSDEEP

    12288:B3B2iSnpd6lw/9qGU5hi2eM8IO9Wc6E52a9CfqdoiYpkElskMINcJwlN5:dB1SnpN9qnh+ToKaS6N/NcGh

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      -INV.exe

    • Size

      616KB

    • MD5

      710d9ff3b02313f81c0ea6679a219c5c

    • SHA1

      0a14506262914b6d5a502fd407d2ca36244d2ede

    • SHA256

      ddbe6aa81458808ff4ffb464a0871f0cde3e69fee90004625029ad882fc77525

    • SHA512

      3c3130fe622605ff67cb640f94be03d416f5e9637b3432cb33a3db14ab6c1f4d363abd12258a5d2fbdc6acad595c8b262fbcb3605c4541eba0f35db008abb3b4

    • SSDEEP

      12288:ssIdul2iNfmFx2iqNhujGjU7eK6H0rvoCT81qCYdoC89GWlsWc1A+l:ssIdul1lmFxU06H0cr5MqPlP+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks