General

  • Target

    40a49e119b750ea5f228dbec54993049.bin

  • Size

    841KB

  • Sample

    230922-bqeelsbd7s

  • MD5

    8df5e27c1740d70c9534a58cf810ff70

  • SHA1

    092634ba0f70605829a694e7539846d684fd335c

  • SHA256

    0fbfa826fe661f869d2c7d782b7013e0676ea99a23c05fe9f7ff44342c73833c

  • SHA512

    4e5d1456565d87497050e2577073dcfbdeb9212f4011b40430ae1c1dffde2f042248f9a56f9f05d835a71c85931ff48f70b9ea66e242d322f1b3b6ad80f575af

  • SSDEEP

    24576:cEj43LQDfeNGPFTgzUA5Cr0gkcLM+qxeV4:Z4pzH5Cr3LYE4

Malware Config

Extracted

Family

lokibot

C2

http://zang2.areen.top/_errorpages/zang2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      3e76776c7d6d505b91cc82d5d135f8c797fc9b3048981091c9102c84a2aedf66.bin

    • Size

      1MB

    • MD5

      40a49e119b750ea5f228dbec54993049

    • SHA1

      1f4643129e658c8150a1c67969cf2923bc3616e9

    • SHA256

      3e76776c7d6d505b91cc82d5d135f8c797fc9b3048981091c9102c84a2aedf66

    • SHA512

      d4bc2150f68757d70f10f52204d399885e14b746624af30016df08bd52cfd66f9454aee9e2f43a3ed868c0ab97d49cf4b6f38027d2099662ae17bc62799399d6

    • SSDEEP

      24576:CWQmmav30xSZy6w6VH6NnqZyew6V26N9+BZ49QUTwhfL/ywMp:HQmmQ306+6VamK6VDe89bTuLqv

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks