General

  • Target

    7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff_JC.exe

  • Size

    560KB

  • Sample

    231010-1d16aaed43

  • MD5

    7c6259d70d7b10251e0a0f9931033863

  • SHA1

    6ec330fdb52cbb785d57ca0427e8e3996f387204

  • SHA256

    7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff

  • SHA512

    49737cf7721b4f8647dfe2e2a12019f3e213fee140919dac0c85c55e7a73210c77d111477ce356dd5c33bb6807b6d3d6ee581de6b871fd20e1f228f3862c56d2

  • SSDEEP

    12288:BcsAckjMIawDkafuMPo6TM/5QIaLPbvxgwnFz:xkAMkfIo6umdn+wF

Malware Config

Extracted

Family

lokibot

C2

http://45.77.76.224/~clinics/uhjaX1tXloDzACvaR

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff_JC.exe

    • Size

      560KB

    • MD5

      7c6259d70d7b10251e0a0f9931033863

    • SHA1

      6ec330fdb52cbb785d57ca0427e8e3996f387204

    • SHA256

      7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff

    • SHA512

      49737cf7721b4f8647dfe2e2a12019f3e213fee140919dac0c85c55e7a73210c77d111477ce356dd5c33bb6807b6d3d6ee581de6b871fd20e1f228f3862c56d2

    • SSDEEP

      12288:BcsAckjMIawDkafuMPo6TM/5QIaLPbvxgwnFz:xkAMkfIo6umdn+wF

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks