General

  • Target

    9ebf8487ee2a54513df4a1bb442aa3fc.exe

  • Size

    990KB

  • Sample

    240509-j4zxgabd88

  • MD5

    9ebf8487ee2a54513df4a1bb442aa3fc

  • SHA1

    980b9b3ea7d88604a855bb2aa2c929c48e92c7c7

  • SHA256

    dab1d46327d46ccbade543f499379b66a9c71a392e96f3aa29f988301bc8b656

  • SHA512

    37574f1e64f33ad04dfa084792d41cca8141511b5e36b6469c0cf09bb13fc42f1f894434962a5e1946719b9cd65c80d4ca629dd30414824a76acfd7cc55f5668

  • SSDEEP

    24576:7xlH0Rs/wyJ++KVqks7PzbthIRrNuevFOPSK80:NlH0Rs/j+FVqkcfthIRrNuevFOPSK

Malware Config

Extracted

Family

lokibot

C2

http://rocheholding.top/evie3/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9ebf8487ee2a54513df4a1bb442aa3fc.exe

    • Size

      990KB

    • MD5

      9ebf8487ee2a54513df4a1bb442aa3fc

    • SHA1

      980b9b3ea7d88604a855bb2aa2c929c48e92c7c7

    • SHA256

      dab1d46327d46ccbade543f499379b66a9c71a392e96f3aa29f988301bc8b656

    • SHA512

      37574f1e64f33ad04dfa084792d41cca8141511b5e36b6469c0cf09bb13fc42f1f894434962a5e1946719b9cd65c80d4ca629dd30414824a76acfd7cc55f5668

    • SSDEEP

      24576:7xlH0Rs/wyJ++KVqks7PzbthIRrNuevFOPSK80:NlH0Rs/j+FVqkcfthIRrNuevFOPSK

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks