General

  • Target

    Payment Advice_16007618765_1.rar

  • Size

    514KB

  • Sample

    240418-z17e5sfa38

  • MD5

    87e331c4dd791e6e0a66c1e56d8cefec

  • SHA1

    b44e8463560a4e56480f42b67d278871851a5355

  • SHA256

    4a49338d1093a91cb0176df46341dea8afa65b6c2244118b14ddb5fb554a7735

  • SHA512

    8f6cc5e26f0a44f46c5793c9e871e9f2bcae2aa53ca243f167b093d5b8633770468f785cd841a8b8e98020232be1c8dec05bf2dd69523700f2ebdaf28dcf4ae7

  • SSDEEP

    12288:RJso+jCJ0wfs/26JkoJvLJOtOLf058JfNLWllwMtPJK+8/4uVqKy2rfRNJDEcG:Cy0wfsVlJD8tOLGEfQ7BI14eq92r/lEt

Malware Config

Extracted

Family

lokibot

C2

http://24.199.107.111/index.php/0672554332862

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Payment Advice_16007618765.exe

    • Size

      590KB

    • MD5

      742b63d93401a9af88183725ee503df3

    • SHA1

      ecfb96a3f57aee691a1c80a750518f39a8cbc474

    • SHA256

      5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313

    • SHA512

      713a629070a15990f1eaa70368bfa891ab3b736060c129ef689ecc8fd3bc5119de7379e71e272cf05d1fa50c73a68edb92a316a0507ee759e91d939d7b4af9b1

    • SSDEEP

      12288:tGL21ILq9J2cWjoIa8JnjoQ/huW2YxUlbODcOYNSddW4Jf5CoXkR:ML21ILq9JrAa8RjDwLYxN4NGNfS

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks