General

  • Target

    c9073e82ea54dc807fb8c89d205ef7f5.bin

  • Size

    425KB

  • Sample

    230922-ckbxzabg9w

  • MD5

    43504a89630efd3b1cc6414a24febd02

  • SHA1

    f21dfc2c2e4a84a0d617d00edb34c5d0c50ade64

  • SHA256

    173ef9755e0832faa5aa3481a32b1da22bb62c602f51b81f3c653f54274f35c7

  • SHA512

    55a02e5c74cc4342420b259885e1fb24b778dfaadd9ac6f226cb1bbed4c814ee73730390ff06667505730d82886a835f79fa20f84a9969249f82b6cab559f6ba

  • SSDEEP

    12288:rKbVOWYx65Ft8kopnwhroCKW8J6ReJrdvOe6hIMFe:Gb7r6dCB8sR05Z8zE

Malware Config

Extracted

Family

lokibot

C2

http://kelly.chinacarbonfiber.buzz/_errorpages/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      eed23ee8d7612d037ba0bd6873b8fa9fc3a9cab674b408c0f7c8be84e9297a76.exe

    • Size

      438KB

    • MD5

      c9073e82ea54dc807fb8c89d205ef7f5

    • SHA1

      148111789603406502edd1206b3eff3ac99c48d1

    • SHA256

      eed23ee8d7612d037ba0bd6873b8fa9fc3a9cab674b408c0f7c8be84e9297a76

    • SHA512

      652c1058758fc82dfbfb3613cc3b18fbabe50cbe675c43d35b73c857181fad971a6a515fa6906abd118e356b3924eb75cd66aa1a0c7e9e6021b3b2d91974de62

    • SSDEEP

      12288:37zrz1kfaYIgGsj0/9xc2tZtzMHAXF1+yrQIkXT:LzwaY+u0V5tHME+oUT

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks