General

  • Target

    c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804.exe

  • Size

    990KB

  • Sample

    240510-kqn4gsdd8z

  • MD5

    ccfc8289ea1ad3acab95de0c1e65eb2c

  • SHA1

    b38ece908f2ffec164f1f19619b16d6bca5d0614

  • SHA256

    c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804

  • SHA512

    b69ff9be50478e7c08216312c2002b46a841f2a233a5a5a895612752b464058d51d11b857fd9c041d0d053dc781a46f2ff3ee7f0c230be2db1bbf3186390bf2a

  • SSDEEP

    24576:SxlH0Rs/WSwTwT2gzlthO/GNuD6FOPSKfBbWyq0:OlH0Rs/cQ2AthO/GNuD6FOPSKJbW

Malware Config

Extracted

Family

lokibot

C2

http://rocheholding.top/evie3/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804.exe

    • Size

      990KB

    • MD5

      ccfc8289ea1ad3acab95de0c1e65eb2c

    • SHA1

      b38ece908f2ffec164f1f19619b16d6bca5d0614

    • SHA256

      c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804

    • SHA512

      b69ff9be50478e7c08216312c2002b46a841f2a233a5a5a895612752b464058d51d11b857fd9c041d0d053dc781a46f2ff3ee7f0c230be2db1bbf3186390bf2a

    • SSDEEP

      24576:SxlH0Rs/WSwTwT2gzlthO/GNuD6FOPSKfBbWyq0:OlH0Rs/cQ2AthO/GNuD6FOPSKJbW

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks