General

  • Target

    DHL Express_AWB#20909328982.exe

  • Size

    650KB

  • Sample

    231101-hlc5babh31

  • MD5

    d029d3ca36642fb8ccca49134a40bf59

  • SHA1

    ab21ee6b0055505248dbcd4e4875e49180da4ce9

  • SHA256

    e2809bd060e2f3c578879f0131092baf39f09b30ee734903fd6e3840628653cf

  • SHA512

    b144cc54ecd2f6e55fe541ad2bd42a585f26dda7fac00407015fd5bb672eccdc28170f66fa8bac47b90e0da0bd4eb75b2edca85052acf501edaf5645749f9a59

  • SSDEEP

    12288:AoS2oapsaTC+/kO+Nccsia2BtA+/uyN8YyXFJSl/t8HYvP8ToT34:v60bNOsutJoY4FJSn8G8To74

Malware Config

Extracted

Family

lokibot

C2

http://146.190.157.174/f5wBqfdsw44C35W

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DHL Express_AWB#20909328982.exe

    • Size

      650KB

    • MD5

      d029d3ca36642fb8ccca49134a40bf59

    • SHA1

      ab21ee6b0055505248dbcd4e4875e49180da4ce9

    • SHA256

      e2809bd060e2f3c578879f0131092baf39f09b30ee734903fd6e3840628653cf

    • SHA512

      b144cc54ecd2f6e55fe541ad2bd42a585f26dda7fac00407015fd5bb672eccdc28170f66fa8bac47b90e0da0bd4eb75b2edca85052acf501edaf5645749f9a59

    • SSDEEP

      12288:AoS2oapsaTC+/kO+Nccsia2BtA+/uyN8YyXFJSl/t8HYvP8ToT34:v60bNOsutJoY4FJSn8G8To74

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks