General

  • Target

    dfe2f4599db2e3dfa96ec5c75660b722

  • Size

    480KB

  • Sample

    240326-xsflcacg41

  • MD5

    dfe2f4599db2e3dfa96ec5c75660b722

  • SHA1

    9b9ffcc91533df1b6eec06a9c857027e78c625d8

  • SHA256

    b1425881919f1d4352d71183f264da766eff03354e81db8ffa558642a6626fbc

  • SHA512

    d90f0ed2d7f0210f4034adf478da706ad67981130d7bc0121d638c73a5cb0d90dd59594fb5759f1b2a39fd1e40e57aefc2112589932e425e8aa4fd4f27578577

  • SSDEEP

    12288:xChpJKjXnk2w39C5GMw882QinfQ1raan+VhQB:xCbYUN9ZP2QiIxsVWB

Malware Config

Extracted

Family

lokibot

C2

http://arku.xyz/tkrr/T1/w2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      dfe2f4599db2e3dfa96ec5c75660b722

    • Size

      480KB

    • MD5

      dfe2f4599db2e3dfa96ec5c75660b722

    • SHA1

      9b9ffcc91533df1b6eec06a9c857027e78c625d8

    • SHA256

      b1425881919f1d4352d71183f264da766eff03354e81db8ffa558642a6626fbc

    • SHA512

      d90f0ed2d7f0210f4034adf478da706ad67981130d7bc0121d638c73a5cb0d90dd59594fb5759f1b2a39fd1e40e57aefc2112589932e425e8aa4fd4f27578577

    • SSDEEP

      12288:xChpJKjXnk2w39C5GMw882QinfQ1raan+VhQB:xCbYUN9ZP2QiIxsVWB

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks