General

  • Target

    FedExAWB#50991274643.exe

  • Size

    532KB

  • Sample

    230921-bz81ksbh9t

  • MD5

    41c56cab32bf0e2f5b11dc0c8d1ba0a0

  • SHA1

    d02b16754e71c4c59bb442d99fb5a986e0cc5a6d

  • SHA256

    650f2f1215bca8640d5edd8d0a5067d40efd6d6272c55ddf1451e7c177fea406

  • SHA512

    20e8891c30a9bcfc6cc1b24f6289f8b53a9bd591fa47ddf8b89aaaf4b4f47e1a74fc321b848b30f4331c13cf67df4d318f97060d0472b45a8e634339941c078d

  • SSDEEP

    12288:FF0qEisUH/woSW1jGa5viXCJSL752ZtAXnu/UO:sqEWooJ84vWNN6C3u/J

Malware Config

Extracted

Family

lokibot

C2

http://45.61.169.32/?p=75025632

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      FedExAWB#50991274643.exe

    • Size

      532KB

    • MD5

      41c56cab32bf0e2f5b11dc0c8d1ba0a0

    • SHA1

      d02b16754e71c4c59bb442d99fb5a986e0cc5a6d

    • SHA256

      650f2f1215bca8640d5edd8d0a5067d40efd6d6272c55ddf1451e7c177fea406

    • SHA512

      20e8891c30a9bcfc6cc1b24f6289f8b53a9bd591fa47ddf8b89aaaf4b4f47e1a74fc321b848b30f4331c13cf67df4d318f97060d0472b45a8e634339941c078d

    • SSDEEP

      12288:FF0qEisUH/woSW1jGa5viXCJSL752ZtAXnu/UO:sqEWooJ84vWNN6C3u/J

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks