General

  • Target

    6390e72ac8be746fa32bdbc1304447c71da8002c4a5c4bb7ffaa3137475bde2b.exe

  • Size

    104KB

  • Sample

    240510-bte6baaf8x

  • MD5

    6732703405a743871bc187a1c8bf16d8

  • SHA1

    cd2de576019aa4cf1c65fa61d8b561432f2a4628

  • SHA256

    6390e72ac8be746fa32bdbc1304447c71da8002c4a5c4bb7ffaa3137475bde2b

  • SHA512

    fc7db554a0c96c5e7e3dc95de2a2116ee9240b4db77dad17739251b69c8b9d4e71f09c0160845d1678cf9fd50b09a62a681abf1ae6a709ea4561457bfe68b23b

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://136.244.109.75/index.php/08409289280180

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6390e72ac8be746fa32bdbc1304447c71da8002c4a5c4bb7ffaa3137475bde2b.exe

    • Size

      104KB

    • MD5

      6732703405a743871bc187a1c8bf16d8

    • SHA1

      cd2de576019aa4cf1c65fa61d8b561432f2a4628

    • SHA256

      6390e72ac8be746fa32bdbc1304447c71da8002c4a5c4bb7ffaa3137475bde2b

    • SHA512

      fc7db554a0c96c5e7e3dc95de2a2116ee9240b4db77dad17739251b69c8b9d4e71f09c0160845d1678cf9fd50b09a62a681abf1ae6a709ea4561457bfe68b23b

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing common artifacts observed in infostealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks