General

  • Target

    b47444cef80ef0f0a66d52811568d72204aa4c09eece615e65e607d9b0e8a8c3

  • Size

    518KB

  • Sample

    240417-qmzzgaag8t

  • MD5

    d1f6be3a57ec3858bddbcfaf4d7e25b3

  • SHA1

    4767b09b7a6b9fcbd06d8b748c846a4ab6765d26

  • SHA256

    b47444cef80ef0f0a66d52811568d72204aa4c09eece615e65e607d9b0e8a8c3

  • SHA512

    66e9d50edbc3e6511748cd2b24f4a35dfd2e0a3da719b62816955dc1f277a61bc36d48efd292b895d3aa85874aac93be2e6556c09407ead5b65f88ce53d28ebd

  • SSDEEP

    12288:oqo8MdJfgH5SR7UFM1bBoAGjPfa7ksu5YbeyO:CNJfJ1g8dZmPdsu5Dn

Malware Config

Extracted

Family

lokibot

C2

http://www.dobiamfollollc.online:3777/vogxhf/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fbed0af892e58c844c0d37e6c68e979b8dbb94b5d6a95876a7cd38e0f0172478.exe

    • Size

      926KB

    • MD5

      01bad75f225c4d649c47a64beefa2881

    • SHA1

      d09fe85240d957304db1201a850c9c8de594bc43

    • SHA256

      fbed0af892e58c844c0d37e6c68e979b8dbb94b5d6a95876a7cd38e0f0172478

    • SHA512

      4b6bec085cc68cde8526c0c637523c10f77ad6b5fd98c529f2592eedb5c75e3d19312157361eac1ac9629d639267d660d7de073a6b4a54c8c4021aeab4c72acd

    • SSDEEP

      12288:Dtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgazP2bDhRBmPU6A:Dtb20pkaCqT5TBWgNQ7azuXXBmU6A

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks