General

  • Target

    7e30d93525c3e7749d7cfc1482facc94

  • Size

    434KB

  • Sample

    240128-2k2wtsdcdk

  • MD5

    7e30d93525c3e7749d7cfc1482facc94

  • SHA1

    1eefc3b3d5367c09978d93998752eed70864631e

  • SHA256

    8fcd8b06a3c163c6104aef452352467b7fe7f7744c50c1cf4b36179fb87f2561

  • SHA512

    97eddf851780569325eeba048904c1a1e1e79ce810f8e2645a4e48ade01516fdd4a4917f09de7242bd8de151a9cd90230b5034b2579839acfb69f4839983ba36

  • SSDEEP

    6144:bgrgAIBGbeh3tzlWb7AbGzW74NAQ2SRBrqsosWkQ8np2MeMLPJuA+:+IBQCFqA2WsFdYsosWn8p2Me+uP

Malware Config

Extracted

Family

lokibot

C2

http://ctp1.xyz/w2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7e30d93525c3e7749d7cfc1482facc94

    • Size

      434KB

    • MD5

      7e30d93525c3e7749d7cfc1482facc94

    • SHA1

      1eefc3b3d5367c09978d93998752eed70864631e

    • SHA256

      8fcd8b06a3c163c6104aef452352467b7fe7f7744c50c1cf4b36179fb87f2561

    • SHA512

      97eddf851780569325eeba048904c1a1e1e79ce810f8e2645a4e48ade01516fdd4a4917f09de7242bd8de151a9cd90230b5034b2579839acfb69f4839983ba36

    • SSDEEP

      6144:bgrgAIBGbeh3tzlWb7AbGzW74NAQ2SRBrqsosWkQ8np2MeMLPJuA+:+IBQCFqA2WsFdYsosWn8p2Me+uP

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks