General

  • Target

    Payment Advice1600761165.exe

  • Size

    555KB

  • Sample

    240417-cszzrscf5y

  • MD5

    3d56d9ae070f55c37fb785f7091c97d4

  • SHA1

    73fec7c52fdc153d11b27f3635e321165dbf23a6

  • SHA256

    9513ea80cc5dabab23c0069ed1b8caaff8d2d10ae9e842bda19a69eb5140a497

  • SHA512

    33969ea3fc56883e6637d5adc67264800ae2a42dab65dcc1018a4fe51c42e21bc4070da38a116bedd14aea41cd89312e35865c5bdef7c9981b1e965c3a531230

  • SSDEEP

    12288:a2CxJV1zVtkSy7RlOnC5OE0CpaFKUp5xmlzfGyJa9xLC4uOxJu0ekR:a2CXjzVtm2C57+KUpCfF4uODu0F

Malware Config

Extracted

Family

lokibot

C2

http://24.199.107.111/index.php/0672554332862

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Payment Advice1600761165.exe

    • Size

      555KB

    • MD5

      3d56d9ae070f55c37fb785f7091c97d4

    • SHA1

      73fec7c52fdc153d11b27f3635e321165dbf23a6

    • SHA256

      9513ea80cc5dabab23c0069ed1b8caaff8d2d10ae9e842bda19a69eb5140a497

    • SHA512

      33969ea3fc56883e6637d5adc67264800ae2a42dab65dcc1018a4fe51c42e21bc4070da38a116bedd14aea41cd89312e35865c5bdef7c9981b1e965c3a531230

    • SSDEEP

      12288:a2CxJV1zVtkSy7RlOnC5OE0CpaFKUp5xmlzfGyJa9xLC4uOxJu0ekR:a2CXjzVtm2C57+KUpCfF4uODu0F

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks