General

  • Target

    309273a4353e215a26f6ceebf70b4c1b

  • Size

    249KB

  • Sample

    231219-qkd9zscchk

  • MD5

    309273a4353e215a26f6ceebf70b4c1b

  • SHA1

    5e5c25b8a585b9e88069cf0c0522e996197ffe30

  • SHA256

    e79623343ba17a7d652e7f27b09bf58c029e00109f888cb21f8f2b1ceccf7d71

  • SHA512

    2e88e768b61f8519d0eac3f1cbc25219f722f48511901f2f052a35049175c4da979fc46e26965ee33edfe1d4407b08b4b0ef753a7320504d8b70de9f30b6fca1

  • SSDEEP

    6144:F8LxBsZpBM0CcEnY5uCHitVfJYG6FPrwegVW4oO2LjnJQCv:/ZzpEYfiffiG0ceg04VkJ3

Malware Config

Extracted

Family

lokibot

C2

http://74f26d34ffff049368a6cff8812f86ee.gq/BN111/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      309273a4353e215a26f6ceebf70b4c1b

    • Size

      249KB

    • MD5

      309273a4353e215a26f6ceebf70b4c1b

    • SHA1

      5e5c25b8a585b9e88069cf0c0522e996197ffe30

    • SHA256

      e79623343ba17a7d652e7f27b09bf58c029e00109f888cb21f8f2b1ceccf7d71

    • SHA512

      2e88e768b61f8519d0eac3f1cbc25219f722f48511901f2f052a35049175c4da979fc46e26965ee33edfe1d4407b08b4b0ef753a7320504d8b70de9f30b6fca1

    • SSDEEP

      6144:F8LxBsZpBM0CcEnY5uCHitVfJYG6FPrwegVW4oO2LjnJQCv:/ZzpEYfiffiG0ceg04VkJ3

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks