General

  • Target

    2340-24-0x000000001BBE0000-0x000000001BC82000-memory.dmp

  • Size

    648KB

  • Sample

    240325-rj6hhsdd4t

  • MD5

    d81e3cc2e3367927e9acd73aced11ecd

  • SHA1

    939a33b70fb41310df13df80d14610ec519b687d

  • SHA256

    5082864caf296f3b8a95ded8b84deb1601fe1fed84740a6861201e8d0d3e27e8

  • SHA512

    a28f24bcc237770d551f8c574e999a543655a2d9992dc5c603dcdb3bd587ce46f9e40829170f4b02ed43e8667c2ef600cf9be44af9cea9d2a4601851ae5329db

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmdu86h:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/c17/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2340-24-0x000000001BBE0000-0x000000001BC82000-memory.dmp

    • Size

      648KB

    • MD5

      d81e3cc2e3367927e9acd73aced11ecd

    • SHA1

      939a33b70fb41310df13df80d14610ec519b687d

    • SHA256

      5082864caf296f3b8a95ded8b84deb1601fe1fed84740a6861201e8d0d3e27e8

    • SHA512

      a28f24bcc237770d551f8c574e999a543655a2d9992dc5c603dcdb3bd587ce46f9e40829170f4b02ed43e8667c2ef600cf9be44af9cea9d2a4601851ae5329db

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmdu86h:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks