General

  • Target

    74e349dc453201663842141aa94093b39c7e258343a03e47afadd64a2b5da2d6

  • Size

    492KB

  • Sample

    240417-qmy26sag71

  • MD5

    ba5aaedf42af47ecc0b4858cf12af7b2

  • SHA1

    4c1ec40e563a6738c03c9126956f6c3ae3cd05dd

  • SHA256

    74e349dc453201663842141aa94093b39c7e258343a03e47afadd64a2b5da2d6

  • SHA512

    284327adf31414b06ad54d821d2f5717a5bb8b152a79b18b750d8edf9f5b7c8af1ac2efe672c6f422534f6f0117cf3427435a1c92dd61ebed5b51434ac677104

  • SSDEEP

    12288:yFCQg9Ddg8+F2K8uZ9eCfkYslLhWYXhf71eRE:wjgNdzgdagYZBP

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/c13/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fd2d0fbf84a26d2dbf9b64e57c4acef804d83eb2c5b10273c1642f9e8ef7db47.exe

    • Size

      561KB

    • MD5

      2e53a8a38c736fe1f0f4c68b5d0bb3f4

    • SHA1

      885c51f3c9189f89d1d5470279d61619165a3793

    • SHA256

      fd2d0fbf84a26d2dbf9b64e57c4acef804d83eb2c5b10273c1642f9e8ef7db47

    • SHA512

      b579fc70131b9f2820749b259436a02bc837af210bb8b33acfdd812731cf5d68c0e6eb71846a7f2e112607adfa83f745840a7e4c3a627cff5fdb744ead627cc8

    • SSDEEP

      12288:kCXCRa5WPw8w07xLNl/5ANKgaHfexlJvuToZ93IbmlFJYCHdDlY:bXCjo67pv1PHfKmTuhJYC9

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks