General

  • Target

    7d6ab0bfa49a0dd92c4b9edb62de20fe450694bf9b2fdb5cbeec92c6ca137095

  • Size

    655KB

  • Sample

    230808-qfpj6acf68

  • MD5

    59894e1fcbacb121a56273e8f387cf57

  • SHA1

    68adc8eb3881785e35d24a08ae8b1c3b6108e06c

  • SHA256

    7d6ab0bfa49a0dd92c4b9edb62de20fe450694bf9b2fdb5cbeec92c6ca137095

  • SHA512

    5fa731b260c87c0a0e44ced4fd34c738c84611f5899ade1d3e709b0998ab2d66f7c9ca54fcf8523c830fdd76d030d381e94631402d363658d0f59384cf08fd86

  • SSDEEP

    12288:ks5IJiF9QS4aRRKLqMS+kOowhIdPiwsPhIle0hcHRE0uHhHjELOV:RWJioSNRFjOowh4PuOle0KyVhD

Malware Config

Extracted

Family

lokibot

C2

http://216.128.145.196/~wellseconds/?p=7982

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7d6ab0bfa49a0dd92c4b9edb62de20fe450694bf9b2fdb5cbeec92c6ca137095

    • Size

      655KB

    • MD5

      59894e1fcbacb121a56273e8f387cf57

    • SHA1

      68adc8eb3881785e35d24a08ae8b1c3b6108e06c

    • SHA256

      7d6ab0bfa49a0dd92c4b9edb62de20fe450694bf9b2fdb5cbeec92c6ca137095

    • SHA512

      5fa731b260c87c0a0e44ced4fd34c738c84611f5899ade1d3e709b0998ab2d66f7c9ca54fcf8523c830fdd76d030d381e94631402d363658d0f59384cf08fd86

    • SSDEEP

      12288:ks5IJiF9QS4aRRKLqMS+kOowhIdPiwsPhIle0hcHRE0uHhHjELOV:RWJioSNRFjOowh4PuOle0KyVhD

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks