General

  • Target

    tmpg67uz36y

  • Size

    518KB

  • Sample

    231002-xk3e5sfe92

  • MD5

    0284ad037d53c56fb477e1df0a9fe8c4

  • SHA1

    ee451b6b8d883bd3535c5523697093743d94813f

  • SHA256

    b5797aaf9a2230a8703d9b814835822c8abc6da3fb5fe1435528964f713abbc4

  • SHA512

    99eadb5596d66414e39e19cfd647c76f890d591b4d8ebf5b7606b53190d36fc0958460487ab5380cfebb2cbceaeb2a7a22a1ffbb7780c1d15ea60e219f17f682

  • SSDEEP

    12288:wpmNumB0apppjNOwS/5tdptmistXV6vonqhcSPHgw6NG5GQ/RTp:oty3DcpiNShcS/gU1/R1

Malware Config

Extracted

Family

lokibot

C2

http://45.77.76.224/~clinics/TWnwcu578emCVQ9B

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      tmpg67uz36y

    • Size

      518KB

    • MD5

      0284ad037d53c56fb477e1df0a9fe8c4

    • SHA1

      ee451b6b8d883bd3535c5523697093743d94813f

    • SHA256

      b5797aaf9a2230a8703d9b814835822c8abc6da3fb5fe1435528964f713abbc4

    • SHA512

      99eadb5596d66414e39e19cfd647c76f890d591b4d8ebf5b7606b53190d36fc0958460487ab5380cfebb2cbceaeb2a7a22a1ffbb7780c1d15ea60e219f17f682

    • SSDEEP

      12288:wpmNumB0apppjNOwS/5tdptmistXV6vonqhcSPHgw6NG5GQ/RTp:oty3DcpiNShcS/gU1/R1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks