General

  • Target

    169780a46f76750795f20c6ace3a0efd.bin

  • Size

    529KB

  • Sample

    240518-bc8rascd4v

  • MD5

    d4bd86ebea737a92b0475b4db6bd644d

  • SHA1

    cf13db61c6a2b6c9daf1c1ff8f328d473f018b90

  • SHA256

    46b20cad71763c153c701d798bc5e8fedb17660746458a658d53de8f054afaac

  • SHA512

    2d081da92feaeaf022791075c74d710f099546951a01f9c78f448419a19f1f802193a0d116951083ac7c699467b67c0700cc033a695580b23d44bbbf3cebd6bd

  • SSDEEP

    12288:lKleiVOJV2vA1u586ZCA53YSQxEfnApOsFNe8VTVc:FiaVzQ8hu32FG

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/d1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7d72439e82ac01968abb65c833b9feb73e8b59337408f5d347c754615e579920.exe

    • Size

      560KB

    • MD5

      169780a46f76750795f20c6ace3a0efd

    • SHA1

      5dace2b67be08c5e759098bb0eaefa1915c4e7bc

    • SHA256

      7d72439e82ac01968abb65c833b9feb73e8b59337408f5d347c754615e579920

    • SHA512

      1759c734f8fa0b3762efa58a24e11f1ea4ca883ed00b0b29882bf02cc6848b5dab29a723cbb29d53c75a5a20d204086d21df7d7bc3645a7df06fefdb4b5a71b9

    • SSDEEP

      12288:I0pei36Reiy/vwTEJnoT+AfoFROFvYR7ubZ5hn92c3oNBw+kzVZXx:Lpp36hy/2EJo3gFROFAAbZ5hcOiBw+kd

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks