General

  • Target

    eed23ee8d7612d037ba0bd6873b8fa9fc3a9cab674b408c0f7c8be84e9297a76

  • Size

    438KB

  • Sample

    230920-wz59xabh66

  • MD5

    c9073e82ea54dc807fb8c89d205ef7f5

  • SHA1

    148111789603406502edd1206b3eff3ac99c48d1

  • SHA256

    eed23ee8d7612d037ba0bd6873b8fa9fc3a9cab674b408c0f7c8be84e9297a76

  • SHA512

    652c1058758fc82dfbfb3613cc3b18fbabe50cbe675c43d35b73c857181fad971a6a515fa6906abd118e356b3924eb75cd66aa1a0c7e9e6021b3b2d91974de62

  • SSDEEP

    12288:37zrz1kfaYIgGsj0/9xc2tZtzMHAXF1+yrQIkXT:LzwaY+u0V5tHME+oUT

Malware Config

Extracted

Family

lokibot

C2

http://kelly.chinacarbonfiber.buzz/_errorpages/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      eed23ee8d7612d037ba0bd6873b8fa9fc3a9cab674b408c0f7c8be84e9297a76

    • Size

      438KB

    • MD5

      c9073e82ea54dc807fb8c89d205ef7f5

    • SHA1

      148111789603406502edd1206b3eff3ac99c48d1

    • SHA256

      eed23ee8d7612d037ba0bd6873b8fa9fc3a9cab674b408c0f7c8be84e9297a76

    • SHA512

      652c1058758fc82dfbfb3613cc3b18fbabe50cbe675c43d35b73c857181fad971a6a515fa6906abd118e356b3924eb75cd66aa1a0c7e9e6021b3b2d91974de62

    • SSDEEP

      12288:37zrz1kfaYIgGsj0/9xc2tZtzMHAXF1+yrQIkXT:LzwaY+u0V5tHME+oUT

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks