General

  • Target

    203a6d2e2504c4358f3523fd512cc9ae8b3787078905df238bcf13e1babb0560

  • Size

    577KB

  • Sample

    240417-qytxlaaa49

  • MD5

    fac2b379b426a28b08cb585c543701e2

  • SHA1

    4d5e702a814992d6fa741f5cf43ffc3251606376

  • SHA256

    203a6d2e2504c4358f3523fd512cc9ae8b3787078905df238bcf13e1babb0560

  • SHA512

    caba5ab5bda4ce67f2aa89a5cdbbda737fbefa6453ac8588a84c2c0b3b0417a58e1a6f788778e5bf69778341aad72459f85b4ceb9a4df79996065766014464fb

  • SSDEEP

    12288:cAqmgCu9GPslCXSH/06o2DOKBp/IIoYoGgaSRQm1VQ7DWtFLD:pqm9u9GklCg/06ooOKjcFGgdf030FH

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/c12/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a533e98a86c878c9eeb075acf501ff5f27641b9677ea1a2b11ef65823cbaf1b5.exe

    • Size

      670KB

    • MD5

      2993b43ab067e38dbcdfca13cc96d1b8

    • SHA1

      1e7af85daa548f03710414f3f1eaec53b03b42ce

    • SHA256

      a533e98a86c878c9eeb075acf501ff5f27641b9677ea1a2b11ef65823cbaf1b5

    • SHA512

      7f24d94f0e38161190b3be1116af0f9e3aff76c75d8edff7efaae5979963a3233b5a3d79c787abf74af17e49d58c2b06c336bf734f73c4bc18dd5fb52cfdd2f9

    • SSDEEP

      12288:FuPuIpkh/8/+yhMvYZ40ZQTp2kFdo94HgNBJojBhTkb9YA+Q40klvK/:aSk/+yhMqQbjhANHojBcl4a

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks