General

  • Target

    21caad3cb5ae80d25ae0dbf124a13acd.bin

  • Size

    533KB

  • Sample

    230607-bpptysgh3v

  • MD5

    d03bd67c9e296eece4b6f77444737588

  • SHA1

    59cd413031f33c9e48c51b435ee5684d728ae0a8

  • SHA256

    ac1900d8a825ad2a3ed11b366cbc3d6a23457661608ab160ecb77dd1afa6d40f

  • SHA512

    4358e1939e727b471283c4ce0471326f5d203712d5b1111bca59c6a1248e10791f8a4e062cdc8e6abb66c24e5beb44b3483b1bc94dbeb1c2b96c095455f30d6f

  • SSDEEP

    12288:8ZtabKoyhMd1oUXIg3JSWflO2RfQ0gsulLgy7RZ8IzL5KDo:Ata2rMDokJ9Dgrgy7RzzL8o

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d2443db39011b4dd31366597f9a9a2bc9b437c8c447f39ed71c17e4a221bf8de.exe

    • Size

      599KB

    • MD5

      21caad3cb5ae80d25ae0dbf124a13acd

    • SHA1

      1830f361752fe41424ec612e9052888dc1b7b26c

    • SHA256

      d2443db39011b4dd31366597f9a9a2bc9b437c8c447f39ed71c17e4a221bf8de

    • SHA512

      9b106c4edc25a222de8670d480796d1e4361864ebdbf10cd837e715b30aa3576b15a0ca76e4e8c112ba0f277b10287723fc3efc73dce383e0a744edb89802c8b

    • SSDEEP

      12288:OBmzZBEP85SJHr11JVyytTb9XkEQHzkAF6o2h7Bn:59BEP8kJHx1JVycTbGVTf2hx

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks