General

  • Target

    SCTR11670000pdf.exe

  • Size

    556KB

  • Sample

    240417-adrczahf8v

  • MD5

    abcbfb3d531d8efece1fbe4a775ddc42

  • SHA1

    6bd0e9ba6e9cb5940a746a798aa382d1ac4ad781

  • SHA256

    8eb0fdf0ff3b38ae84311b29effb0030a3b9a38430f7b8ee7918d2eb1301b12e

  • SHA512

    54e77b6c5dd70dd1384c1e2f512bc289431ab814ada3807c1602559cba736770f7110e2c01b47256a70b0f812bd8903e3cc15acee03b889ec2bea467c34e912a

  • SSDEEP

    12288:8JSpOXGHT6O0SoGHndk4OVPw0WrZcKUXh5Mm0uY8jiup6kR:SRXmEInkV09qXhaK+upZ

Malware Config

Extracted

Family

lokibot

C2

http://136.244.109.75/index.php/690877741063

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SCTR11670000pdf.exe

    • Size

      556KB

    • MD5

      abcbfb3d531d8efece1fbe4a775ddc42

    • SHA1

      6bd0e9ba6e9cb5940a746a798aa382d1ac4ad781

    • SHA256

      8eb0fdf0ff3b38ae84311b29effb0030a3b9a38430f7b8ee7918d2eb1301b12e

    • SHA512

      54e77b6c5dd70dd1384c1e2f512bc289431ab814ada3807c1602559cba736770f7110e2c01b47256a70b0f812bd8903e3cc15acee03b889ec2bea467c34e912a

    • SSDEEP

      12288:8JSpOXGHT6O0SoGHndk4OVPw0WrZcKUXh5Mm0uY8jiup6kR:SRXmEInkV09qXhaK+upZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks