General

  • Target

    -Certificate of analysis.zip

  • Size

    542KB

  • Sample

    230606-qjcprsdg74

  • MD5

    a8daec5a05981e2d8a416ffae08f6e35

  • SHA1

    4b6128d189f76dfa97ca17b34ec993565be6fe10

  • SHA256

    75a78f2758626fc1ef5e1bda1f20a007e576ab83ecd515e29d9203e8b283c725

  • SHA512

    5e950eaeceafe3f16d755fade15483a7b897220360ccf70fdb36a10eebb355f65d7be1597a0fcfcc5b8ce997e5f9f8a8589ccf51b56f437cb47b5232dafe769c

  • SSDEEP

    12288:G3B2iSnpd6lw/9qGU5hi2eM8IO9Wc6E52a9CfqdoiYpkElskMINcJwlNS:uB1SnpN9qnh+ToKaS6N/NcGq

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      -Certificate of analysis.exe

    • Size

      616KB

    • MD5

      710d9ff3b02313f81c0ea6679a219c5c

    • SHA1

      0a14506262914b6d5a502fd407d2ca36244d2ede

    • SHA256

      ddbe6aa81458808ff4ffb464a0871f0cde3e69fee90004625029ad882fc77525

    • SHA512

      3c3130fe622605ff67cb640f94be03d416f5e9637b3432cb33a3db14ab6c1f4d363abd12258a5d2fbdc6acad595c8b262fbcb3605c4541eba0f35db008abb3b4

    • SSDEEP

      12288:ssIdul2iNfmFx2iqNhujGjU7eK6H0rvoCT81qCYdoC89GWlsWc1A+l:ssIdul1lmFxU06H0cr5MqPlP+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks