General

  • Target

    3bab54a2bc096159964f2ddbcce93437dd97f3d9e00bca81dc37d5938afebe99

  • Size

    553KB

  • Sample

    240417-qwe1nahg96

  • MD5

    34c58389f399c2df3c6da6ef4fc30352

  • SHA1

    e0a04c637370ad078c65b2e744a24401deebbf1f

  • SHA256

    3bab54a2bc096159964f2ddbcce93437dd97f3d9e00bca81dc37d5938afebe99

  • SHA512

    39d02a86d6c008f2fc09cd5b4f78c1f0ecbd92a6bf9b94f688ff3b071396d8917a6d641764fe8ca4eb5909612526dd910e295fde9f88337ee11b80b83b61f596

  • SSDEEP

    12288:KMyykRfzJmOM2h7CLXe5Oy+7QYlk0bgoHFVydIM+yc8:PER7JmOxCL5y+nlEoHLyq2n

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/c17/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ed0060d90610311944437da9ecc113e293b2800b903e5617b115d5bc48c379bd.exe

    • Size

      596KB

    • MD5

      31622d9e964f5065f6940c1771ca0940

    • SHA1

      a3212dad73b667a3e555cefe22512e22633f7a55

    • SHA256

      ed0060d90610311944437da9ecc113e293b2800b903e5617b115d5bc48c379bd

    • SHA512

      cd7dc9e49b51dce78f75f38a7bb4e7735fd836668d12d92e0ab144462fb95170f926a938bb3b1b8cbee645ddf27f53be03f2f609873c4728dd18292093c62d67

    • SSDEEP

      12288:v5E0oN04j4uYuDHppCK1oIG6k7BKkCivD0qkLwPFA:uA4//cZ6kckCwD0Dw

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks