General

  • Target

    C4B632F0468DAE6A10B67D50A2F6E322.exe

  • Size

    368KB

  • Sample

    240422-dwbl1seh23

  • MD5

    c4b632f0468dae6a10b67d50a2f6e322

  • SHA1

    ca3a42cb757d86d86c2859b2a5d5250d857128c3

  • SHA256

    b3bb12ae88279341ff46626660249155b11effa41f3389ace07f4aa6f1045f8c

  • SHA512

    7113e3cd8e732dc89da73d81e186cc026364588a7abe36f65ba05a28fc2f56bce72083b0fcd692f0495e897feaafeffdb53d761727a0fd0288fe5cecb5451edf

  • SSDEEP

    6144:k4651c9nt3FAIHysm374mPKHCZukBsbh3Wnb22X3ASFL5TrJ9D0+L8wu2+gI:RZ7F1y5hcW+sbxQeL5TrD0+L8wu2+9

Malware Config

Extracted

Family

lokibot

C2

http://91.92.253.228/tjmkdc/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      C4B632F0468DAE6A10B67D50A2F6E322.exe

    • Size

      368KB

    • MD5

      c4b632f0468dae6a10b67d50a2f6e322

    • SHA1

      ca3a42cb757d86d86c2859b2a5d5250d857128c3

    • SHA256

      b3bb12ae88279341ff46626660249155b11effa41f3389ace07f4aa6f1045f8c

    • SHA512

      7113e3cd8e732dc89da73d81e186cc026364588a7abe36f65ba05a28fc2f56bce72083b0fcd692f0495e897feaafeffdb53d761727a0fd0288fe5cecb5451edf

    • SSDEEP

      6144:k4651c9nt3FAIHysm374mPKHCZukBsbh3Wnb22X3ASFL5TrJ9D0+L8wu2+gI:RZ7F1y5hcW+sbxQeL5TrD0+L8wu2+9

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks