General

  • Target

    9f6a0a2b53723a6670b45c75d032423bcd56aa6a89f377f5a1ceb442a231d25f

  • Size

    510KB

  • Sample

    230922-ln1vyahc34

  • MD5

    beaecae8ebe61bf7b14074c9e51e90f7

  • SHA1

    ad3db1db611c5034b8ee4780d125f875684b1ba2

  • SHA256

    9f6a0a2b53723a6670b45c75d032423bcd56aa6a89f377f5a1ceb442a231d25f

  • SHA512

    b7a21b4dba7dbd68d606d67c6133a6f1d0dd661298c77b68fb051079e4c8d50c9bbaaf249059db2751d74962fb80d20b350c24f3238058e00f1b87162a70b46a

  • SSDEEP

    12288:AtHFmrD67yOilEDkl5LyKi8Mt7FMmMNJSJWHIj:AsD0yOiKDS5LlAt7KbSj

Malware Config

Extracted

Family

lokibot

C2

http://185.216.71.207/_errorpages/space/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9f6a0a2b53723a6670b45c75d032423bcd56aa6a89f377f5a1ceb442a231d25f

    • Size

      510KB

    • MD5

      beaecae8ebe61bf7b14074c9e51e90f7

    • SHA1

      ad3db1db611c5034b8ee4780d125f875684b1ba2

    • SHA256

      9f6a0a2b53723a6670b45c75d032423bcd56aa6a89f377f5a1ceb442a231d25f

    • SHA512

      b7a21b4dba7dbd68d606d67c6133a6f1d0dd661298c77b68fb051079e4c8d50c9bbaaf249059db2751d74962fb80d20b350c24f3238058e00f1b87162a70b46a

    • SSDEEP

      12288:AtHFmrD67yOilEDkl5LyKi8Mt7FMmMNJSJWHIj:AsD0yOiKDS5LlAt7KbSj

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks