General

  • Target

    92f18cfa658c4279fd7e00a15ec63ca51eae49c217fe62b1c40443e144347728

  • Size

    534KB

  • Sample

    240417-qy28zabf4t

  • MD5

    973bb12c4a6deb9c258a30204485d310

  • SHA1

    2900a2fc75a2f9a7b7bf9d3a41825c05051db7dd

  • SHA256

    92f18cfa658c4279fd7e00a15ec63ca51eae49c217fe62b1c40443e144347728

  • SHA512

    9b263b1d51aed5ea66a478e7546b25c40f8cbc979e99c6f3197781da090d383435e74bc75f187cb62205d12d71c7d4b332fa4d7c04ed564f15ba6d4636abda47

  • SSDEEP

    12288:+yl5z+xLpPHtPCP7d6PY3XS5kLgqkb6b8Uc9hTUfoCgZYy/:N5z+1pPNPAxWki5rR2bATUwCRy/

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/c19/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e20cf5c319fe815eb1845556289e56f8c3241019a907adb6f4a33e8dc9ecab59.exe

    • Size

      559KB

    • MD5

      f13f9ca5ede930df8310e504372ca4e5

    • SHA1

      bd28bfbb2472cd7f66be9cfcc11b77c17d08cec7

    • SHA256

      e20cf5c319fe815eb1845556289e56f8c3241019a907adb6f4a33e8dc9ecab59

    • SHA512

      ffe9fc1378bd084fa785c2d9361c32dcc740355d208b425647b3a0e5b02f8040154e60595e62c8100728ed4ded99c1d9ce3c69de3a8ce4226d50be0c5955850a

    • SSDEEP

      12288:CsHzOUNUSB/o5LsI1uwajJ5yvv1l2ihNYL+58d2:ViUmSB/o5d1ubcvvu+502

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks