General

  • Target

    3a9ef63b707922509414283b636fa63acbfbaf33d3ad5b5b0b1f0b9bc86c9be8

  • Size

    519KB

  • Sample

    240417-qrdl2abb2s

  • MD5

    0063e0782d1df28a57f21d80eacbdd85

  • SHA1

    31dccc5d40a1f2c8c452f5528b1e17af6eb8ed71

  • SHA256

    3a9ef63b707922509414283b636fa63acbfbaf33d3ad5b5b0b1f0b9bc86c9be8

  • SHA512

    f2ba66a963b0ff028f6d65604dee36e5095df9666a914363b8885b766046fdcc22d024d39594a1e86bd36f8805f339ab7ae77c45a5e6cf16d576d4001108bf3d

  • SSDEEP

    12288:M8Ja6pOefPp05TrN2a29QFxpb5wjVWokhYRd:M0ahCP4k6/bWj1MYRd

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/c6/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      bbc7fdaebde9c78601c1965f662082874bae5e023f85701316f930266b0482c6.exe

    • Size

      566KB

    • MD5

      0aa08a1de128f754244a41caad13b855

    • SHA1

      d757260a3e82337339e45a596e7f879df42776e7

    • SHA256

      bbc7fdaebde9c78601c1965f662082874bae5e023f85701316f930266b0482c6

    • SHA512

      555951f159cd139d0d7d8f8ea1f36faed3d82e1c96833198450355bd620c63a3a1c0b55d8cd3a33b4c37678bbba31819562c3743be9dd73fc509e52cb62273df

    • SSDEEP

      12288:Zp4CMwaRzpgQF9z72qYps2bgBiFhNTetpAAI2xv2nA:izFFo4ALNyt9jxO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks