General

  • Target

    Megrendelés_(P.O_5029063)_FANUC.exe

  • Size

    18KB

  • Sample

    230606-yr5draga3t

  • MD5

    1839d60cf892ae968e59ad532281b0fe

  • SHA1

    abd2b2a281694b01f36d4a3972b242b57ad9b9b7

  • SHA256

    380265b82ef7a370c15289a465dd7e7ea094448ab20a0be51656ff676bbae616

  • SHA512

    f393efbe745e7604615cd9bfd4011eb8b044d884bbb934e6806ef20403932049c49127e994bd0817070f7f5618470435662e81976f9334eef852c11c2b4c7ea0

  • SSDEEP

    384:hjbmk369zMPVkcIZ5nAtk0umWn46GxajePojjMCm9UGAtw1cwhHuC1:pbmkq9VaPuv41ajePKtmG5KcwhHh1

Malware Config

Extracted

Family

lokibot

C2

http://efvsx.cf/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Megrendelés_(P.O_5029063)_FANUC.exe

    • Size

      37KB

    • MD5

      7c823274ec6a711a73c4c7df54d1d4cd

    • SHA1

      8c78efece5e8c83205df2b18390b3e53396bd237

    • SHA256

      b432b8aa06d6977b2f87eafa17634e0fded464c7a521e0120c393c4f4d084fc9

    • SHA512

      f6e14be4995d1f74ee9c18f2797035a99ddb95f62f3d1c9dd8b522da290e94e8a32f6a739ee4e930f2c9d3f93eb35cff33b44a8d8bd915b1d0fee14b19e8c475

    • SSDEEP

      768:bNyecx7gKng+pF0WeIUDNC6YGcoMcRC7n8Yila:b0ecx7g+70dIUpC6YFoFo78lla

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks