General

  • Target

    823266766e404bba77e7b98721cc503cbf6bfb2b6303c1b1c4c9f23a3ccc9ec2

  • Size

    502KB

  • Sample

    240417-q4epvsad53

  • MD5

    e670ff498d8e1e1c6ceb222b012b3b27

  • SHA1

    34d3bcae998a80101072f9cb6bb33318ae381667

  • SHA256

    823266766e404bba77e7b98721cc503cbf6bfb2b6303c1b1c4c9f23a3ccc9ec2

  • SHA512

    69692e5b01dbd3848eeac8d0bc07988f54f8cc05869af8311173c12808e0361959acbe85b57a775730870cd17acdfedda58678aef32e6683ecf8c9a61a8d15c4

  • SSDEEP

    12288:pqd/P1J0uE/UTwoDLphfgaFASFb9mv/smy6s7g3sNd3UZ4kkoJp:pqdH1J01/EwonDFFFfPCfB

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/c17/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7cc872c2db97ac517a53904af50ad37dd08ca934fd1a48d4ebbd4c593c9cf528.exe

    • Size

      535KB

    • MD5

      dce3a42744dfd9236299039e09ed1fc9

    • SHA1

      e677a7accc88342822454c28a55cee05cc8d0ac0

    • SHA256

      7cc872c2db97ac517a53904af50ad37dd08ca934fd1a48d4ebbd4c593c9cf528

    • SHA512

      ce85b18d067cf01f9563cd8c85f6eeba64f32cd55682a0a51fe7bdf2d395d69e5712ba88f88f9a890c3366125266e9319f3766adba30d80c695de553db2427de

    • SSDEEP

      12288:J8/xQNl/Wqq9WylY3mVOgfhl9ZFn2IGkPyIfDD/zy/wlEYi:2mZy1VOgfb9NYU3r76

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks