General

  • Target

    20052024_1609_PO_46338730_Akyurek.vbs

  • Size

    424KB

  • Sample

    240520-tl4g2shc5x

  • MD5

    5c8a0cd7c1df368d3669e57e4e6eb7ff

  • SHA1

    8396814190693dc7a85a46eeb3f4d594041c1432

  • SHA256

    36079fc645456f2d6c195be5a0aaf0206116b57338796388c7db6454da0364f7

  • SHA512

    f77ffb638fb305171fc5da4d524bf0091434f9cd8e3bec5ca961e96a5ca426af8d8b1cc2ec0e2701abe5ae091cf1358ea4d5326ec750c3ad5473a2a1ae9d6c36

  • SSDEEP

    6144:f8Ozdm1XyaRDv6AxV+Ci7Ax3lJlg3jOwPJJw0bqEKo11EbpNVM:fY1X3hxQCinTfbqEKo11EbdM

Malware Config

Extracted

Family

lokibot

C2

https://altaskifer.sbs/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      20052024_1609_PO_46338730_Akyurek.vbs

    • Size

      424KB

    • MD5

      5c8a0cd7c1df368d3669e57e4e6eb7ff

    • SHA1

      8396814190693dc7a85a46eeb3f4d594041c1432

    • SHA256

      36079fc645456f2d6c195be5a0aaf0206116b57338796388c7db6454da0364f7

    • SHA512

      f77ffb638fb305171fc5da4d524bf0091434f9cd8e3bec5ca961e96a5ca426af8d8b1cc2ec0e2701abe5ae091cf1358ea4d5326ec750c3ad5473a2a1ae9d6c36

    • SSDEEP

      6144:f8Ozdm1XyaRDv6AxV+Ci7Ax3lJlg3jOwPJJw0bqEKo11EbpNVM:fY1X3hxQCinTfbqEKo11EbdM

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks