General

  • Target

    Order #7990.exe

  • Size

    532KB

  • Sample

    230921-a4mgpsde85

  • MD5

    360638809561a7c61ee8523789ee5ac0

  • SHA1

    777a52c92a01303c581ee507fae907b189918bec

  • SHA256

    cbc31caf32b2849eb3d0b11dd39ed17b7ee4354725f1af91df412daf57104fd0

  • SHA512

    38c0aef28bdb39713078426e405cac1b28c386eb06cdf1187592b253e3ba90225cb466850d3107225bc4cc566702393823f5cd5764d70127c765e893a434b02d

  • SSDEEP

    12288:vpqEisUH/HWUdTAW2BL6Ri+1nv/BuJS5rc+hNnVXdi:BqEWuUdTv2eiKnvIk5rc+hLM

Malware Config

Extracted

Family

lokibot

C2

http://45.61.169.32/?p=5430614

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Order #7990.exe

    • Size

      532KB

    • MD5

      360638809561a7c61ee8523789ee5ac0

    • SHA1

      777a52c92a01303c581ee507fae907b189918bec

    • SHA256

      cbc31caf32b2849eb3d0b11dd39ed17b7ee4354725f1af91df412daf57104fd0

    • SHA512

      38c0aef28bdb39713078426e405cac1b28c386eb06cdf1187592b253e3ba90225cb466850d3107225bc4cc566702393823f5cd5764d70127c765e893a434b02d

    • SSDEEP

      12288:vpqEisUH/HWUdTAW2BL6Ri+1nv/BuJS5rc+hNnVXdi:BqEWuUdTv2eiKnvIk5rc+hLM

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks