General

  • Target

    b642235d1e7817992f4cb49d032ee3768f4a98c4.rtf.tar.gz

  • Size

    25KB

  • Sample

    240514-kgmt3ahc67

  • MD5

    fa22f6420413dd10c186ffb33d4772c3

  • SHA1

    fb1e68941b5fc537d7b826bfe9042235b5d7242f

  • SHA256

    b2728374a94bb989d543d9d8f6c55310807831034b49909599ef63211e435c39

  • SHA512

    570c6df13a5f2aa85f3d78ab62d84b95976368ea6bb79a9ffba5674edd7ae1804093e81ef63aa3c3ad319f626575ac93965e80f2466d7ccf8c9b68cc7b1a7b0e

  • SSDEEP

    768:66huBXCKrTVCBZLT/gjf5H87nd/EOj2WoUyXRFK4nWNm:ruNzrTVCBZLT/gb5H87nLyWKFKIWNm

Malware Config

Extracted

Family

lokibot

C2

http://rocheholding.top/evie3/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b642235d1e7817992f4cb49d032ee3768f4a98c4.rtf

    • Size

      130KB

    • MD5

      ce038e37957dceae2606bd0a639b3254

    • SHA1

      b642235d1e7817992f4cb49d032ee3768f4a98c4

    • SHA256

      b4d1da52a264e0e03f795a00bdc2d7827c1f4345d5d60f4d2e651569a47967b1

    • SHA512

      e3b7d54551a549d78cea14356ab07ec70fd0eb5273817725bb2d068b7378ef61b544e87875ecc8e5be43bb4772d91eb10f0e9afd8f811b27b9c2fa241570038e

    • SSDEEP

      1536:lwAlRkwAlRkwAlRkwAlRIiHvXA57LiSIdmjSW:lwAlawAlawAlawAlTA57udkSW

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks