General

  • Target

    594bafd76c461932f100f8a586c77bbcfab182914062b92b4b24b6611e2d879b

  • Size

    473KB

  • Sample

    240417-qhm44sgh96

  • MD5

    130b57e263c6a7da68743928f529484f

  • SHA1

    2aa43395fedee6cf357da37acc0ff3cec954383c

  • SHA256

    594bafd76c461932f100f8a586c77bbcfab182914062b92b4b24b6611e2d879b

  • SHA512

    e36fff934db3496faeac99b507dac8ff81033ea98f2e9c83bdfdad9254b6aebbdb58d49385c3c0b749a8774ab1de3f19b25ae648942f2f206d171470016dfee0

  • SSDEEP

    12288:Pz0+VCOUz5HWFzpveSpP6EbLGTxebu1y0sZS:Pz0OUztUzpWWSEbCTxea/sZS

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/c16/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe

    • Size

      490KB

    • MD5

      a8f86e43a86f3e0047342917a3b4d823

    • SHA1

      90e606c3aa0f2e7e438ad0eb4e43a391adf7af6a

    • SHA256

      454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743

    • SHA512

      794f30895e43498d59449f680f6298b09a947003ff7f09a33ed2241a16cf5bfcaf06968511bf95e2d4ecb2554a19ca936396e21128b0a32bc9e6ce636ce6c6d5

    • SSDEEP

      12288:Yes3/5HnQc1x6qDCRSMXZrT12L1fRFen:zwBHN3FDF0TMRfR8

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks