General

  • Target

    6053c4c96027a86c60053056dc1f2a90142179b628d82f4ac73315ddf36bf544

  • Size

    752KB

  • Sample

    230607-wjfpbaee3x

  • MD5

    93ab3d819fe8cc655bba88caabeeaeea

  • SHA1

    7dd0641c39e98ecd674fc0c47975a83c46cb4833

  • SHA256

    6053c4c96027a86c60053056dc1f2a90142179b628d82f4ac73315ddf36bf544

  • SHA512

    f8ae2e9a7d121108ad22d97404694675ed9c786f66a474523cea47b8d32ac72fe1f86ab37ba44db8e3e3e7ebb22bd52648024999ac512bec27a952c98a1452f4

  • SSDEEP

    12288:AHrihaDnLMzIL2q+RTdOL8MHwn40Vi+it7irZ6vsFk/ycFibGbQjmP4kTX7:A0OyqGUL8DViPt7it6vsFS/FibG0w4k

Malware Config

Extracted

Family

lokibot

C2

http://161.35.102.56/~nikol/?p=882166721559

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6053c4c96027a86c60053056dc1f2a90142179b628d82f4ac73315ddf36bf544

    • Size

      752KB

    • MD5

      93ab3d819fe8cc655bba88caabeeaeea

    • SHA1

      7dd0641c39e98ecd674fc0c47975a83c46cb4833

    • SHA256

      6053c4c96027a86c60053056dc1f2a90142179b628d82f4ac73315ddf36bf544

    • SHA512

      f8ae2e9a7d121108ad22d97404694675ed9c786f66a474523cea47b8d32ac72fe1f86ab37ba44db8e3e3e7ebb22bd52648024999ac512bec27a952c98a1452f4

    • SSDEEP

      12288:AHrihaDnLMzIL2q+RTdOL8MHwn40Vi+it7irZ6vsFk/ycFibGbQjmP4kTX7:A0OyqGUL8DViPt7it6vsFS/FibG0w4k

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks