General

  • Target

    d597ef39da62e7ae8306c542bf2c2e5c

  • Size

    1.1MB

  • Sample

    240319-jsk9yaeh6w

  • MD5

    d597ef39da62e7ae8306c542bf2c2e5c

  • SHA1

    cd9d8b49cf0e264ca9865edd5e54c5efa61dd9c2

  • SHA256

    422cb0f6bdffaaacfee8a7984957c6bd0a8e1d6edd773657a6dbe1a62f81bb45

  • SHA512

    dad1a42a731ef2973fa0cf1ed7d644945c04d14dd5ffff5248681c518b6beeb9bca92c2a2f953e25ac956980f5b61d55299d4134aee77c7af0c0bfe0e12d14b4

  • SSDEEP

    24576:MNoZKrFYvblhBj/JoqPLDF0pe+oxfIXC:sbyj1aiLZyoVIS

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/rD5fy9Ok7coFb

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d597ef39da62e7ae8306c542bf2c2e5c

    • Size

      1.1MB

    • MD5

      d597ef39da62e7ae8306c542bf2c2e5c

    • SHA1

      cd9d8b49cf0e264ca9865edd5e54c5efa61dd9c2

    • SHA256

      422cb0f6bdffaaacfee8a7984957c6bd0a8e1d6edd773657a6dbe1a62f81bb45

    • SHA512

      dad1a42a731ef2973fa0cf1ed7d644945c04d14dd5ffff5248681c518b6beeb9bca92c2a2f953e25ac956980f5b61d55299d4134aee77c7af0c0bfe0e12d14b4

    • SSDEEP

      24576:MNoZKrFYvblhBj/JoqPLDF0pe+oxfIXC:sbyj1aiLZyoVIS

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks