General

  • Target

    87e331c4dd791e6e0a66c1e56d8cefec.bin

  • Size

    515KB

  • Sample

    240420-bvbvaacg82

  • MD5

    670038c453b29b867e4b2ac236197b56

  • SHA1

    c40a4e6af79d27333c58fe6e300334a92f4bc45f

  • SHA256

    6ad5b5cd38256f61191c86f66a967b5da9648c8696322b97246b56d1adb17b79

  • SHA512

    0c6b16f61e063aa5cb2e55507be3497cbf6430362ee2444e7a6862be0fe7d36fc70a7462e307f7ccd135862d220d1c4d70bce7b0ea723f8db04b52de36831337

  • SSDEEP

    12288:zAuklBBQ71BalyvWptL9+yogt9WrIiH6w0:M5wilCWptZghrXaw0

Malware Config

Extracted

Family

lokibot

C2

http://24.199.107.111/index.php/0672554332862

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Payment Advice_16007618765.exe

    • Size

      590KB

    • MD5

      742b63d93401a9af88183725ee503df3

    • SHA1

      ecfb96a3f57aee691a1c80a750518f39a8cbc474

    • SHA256

      5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313

    • SHA512

      713a629070a15990f1eaa70368bfa891ab3b736060c129ef689ecc8fd3bc5119de7379e71e272cf05d1fa50c73a68edb92a316a0507ee759e91d939d7b4af9b1

    • SSDEEP

      12288:tGL21ILq9J2cWjoIa8JnjoQ/huW2YxUlbODcOYNSddW4Jf5CoXkR:ML21ILq9JrAa8RjDwLYxN4NGNfS

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks