General

  • Target

    c807a91d0b1e611e54592d3f9633b52e

  • Size

    908KB

  • Sample

    240314-h42kmafg96

  • MD5

    c807a91d0b1e611e54592d3f9633b52e

  • SHA1

    6c8e874441119c9f7c45f445cfc1e439fca73640

  • SHA256

    7ec6b541616cc3f1fb1c458dd16f7edffff13a9b3c954d33442231ff38704c29

  • SHA512

    65703716e91a79d84f0718320f7d40228e74cb9cbe81bd5b9b242151cc78f660f0dee394b6420acfcb5f0c12970b8fd72644cb29e8468e3d1678c81f9cd8dc03

  • SSDEEP

    12288:8TXvOdgn5S6hWmsDc9F3nC0Py3gAhuDzUOF51UqiT7uWqYpALCnHBFe2lXpgUSIz:8YMBzdCqiTDqDAHSaXpjL+Sl

Malware Config

Extracted

Family

lokibot

C2

http://zamloki.xyz/co/uo/BO.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c807a91d0b1e611e54592d3f9633b52e

    • Size

      908KB

    • MD5

      c807a91d0b1e611e54592d3f9633b52e

    • SHA1

      6c8e874441119c9f7c45f445cfc1e439fca73640

    • SHA256

      7ec6b541616cc3f1fb1c458dd16f7edffff13a9b3c954d33442231ff38704c29

    • SHA512

      65703716e91a79d84f0718320f7d40228e74cb9cbe81bd5b9b242151cc78f660f0dee394b6420acfcb5f0c12970b8fd72644cb29e8468e3d1678c81f9cd8dc03

    • SSDEEP

      12288:8TXvOdgn5S6hWmsDc9F3nC0Py3gAhuDzUOF51UqiT7uWqYpALCnHBFe2lXpgUSIz:8YMBzdCqiTDqDAHSaXpjL+Sl

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks