General

  • Target

    9fcc06e0999351b0d82b5299cdb02a077d66bbdcfcaa4f59de3c8424a4b6fa56

  • Size

    464KB

  • Sample

    231010-j765ysec26

  • MD5

    9e98c09164ecaa9199c9781a87ebbcf8

  • SHA1

    d91f6ded1ecc99b6b687a48392dc8140cd0cd7d6

  • SHA256

    9fcc06e0999351b0d82b5299cdb02a077d66bbdcfcaa4f59de3c8424a4b6fa56

  • SHA512

    ee0f26cc4a8a68d150c522966a7072db2721a428a75eacc15c1ab0286e0e25e72ef178916e8675e066d8046bcea0fc0c9e826c9b32d4a086f79ffedb6c5387e3

  • SSDEEP

    12288:qwEk1WyuLTo5MgnSrb85MIoV/nLeKLk+8/M9dk5yn3jwz78:qrk1WjLsfSr45qLbLk+8/M9dk5YUP8

Malware Config

Extracted

Family

lokibot

C2

http://185.216.71.207/_errorpages/evil1/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Donat_Q88 (Oil)_07Aug2023110129933.exe

    • Size

      522KB

    • MD5

      e22c607aaa393fdf742c1edde79d599e

    • SHA1

      b0b8096872e966b5a66b620c313b2ca3542320a6

    • SHA256

      800db62cfd80b24607791f24e39242a581669bf53dd8c82e53e8eea5007e81e1

    • SHA512

      69a13eaf76e2515043eec0d873626138c52ec24bed1f8e22253ae778c598115d4d5f18ccd119964db2d6e38a74afade49e0e2f10c1103474385067c752af5eba

    • SSDEEP

      12288:LV5LrfX9KFw0Vuh4yOFqqrVgnwQ1tMFS/MuL/ZVn:Lftgu3aru7tc1I/3

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks