General

  • Target

    f3edc4eca9b587cd1c25d034cf2d4c28e7caf604f90a3b1b6fb34da036de6de7

  • Size

    492KB

  • Sample

    240417-qywq7aaa53

  • MD5

    0bb49a2af625059a8a6ea6376d747720

  • SHA1

    adc38fb22ef96e5b026fc75d88fd20e080a1bb72

  • SHA256

    f3edc4eca9b587cd1c25d034cf2d4c28e7caf604f90a3b1b6fb34da036de6de7

  • SHA512

    d8cf5fbf6b3c97826291be368bc93c41b97ee451bec193e852880089dd44cac51ff942c2cdbb922bebcc9a362a60d15ffd1b60ef03c823877987904b1475ce2e

  • SSDEEP

    12288:86uXMYL1oQMojh2PkfrL/Jb54LnkXDBIdVwLLhpWl9rk:86uZL1JMC9rLRN4LkXDJRUk

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/c13/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fd2d0fbf84a26d2dbf9b64e57c4acef804d83eb2c5b10273c1642f9e8ef7db47.exe

    • Size

      561KB

    • MD5

      2e53a8a38c736fe1f0f4c68b5d0bb3f4

    • SHA1

      885c51f3c9189f89d1d5470279d61619165a3793

    • SHA256

      fd2d0fbf84a26d2dbf9b64e57c4acef804d83eb2c5b10273c1642f9e8ef7db47

    • SHA512

      b579fc70131b9f2820749b259436a02bc837af210bb8b33acfdd812731cf5d68c0e6eb71846a7f2e112607adfa83f745840a7e4c3a627cff5fdb744ead627cc8

    • SSDEEP

      12288:kCXCRa5WPw8w07xLNl/5ANKgaHfexlJvuToZ93IbmlFJYCHdDlY:bXCjo67pv1PHfKmTuhJYC9

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks