General

  • Target

    14574936532_NeikiAnalytics

  • Size

    372KB

  • Sample

    240521-hnhskscb3s

  • MD5

    eae12d61710fffcb6368a5b37e94e212

  • SHA1

    bc66029cc36c623a2816a9a6f87dd081a3161e89

  • SHA256

    3ab84a91cdd6484afa41b0b99d3e365ba288db5c6e2487b38638c1209cbc0661

  • SHA512

    7058feaea52a4277edba0559d9d034d498ba0c0431ac9b0c32efae691b3e5adc86b4150872373cc794796a13ba25b9f0f90171a565d5ab9bbe6aadf5ee24f8f7

  • SSDEEP

    6144:JMAEOThVdagU/7tezi95kGZ+T4Y3nuu9zSd9J0zDphKLYD/m8MAzENnunltsN1Ta:NfTLEgZoSo+TB3nuWSdj0zFA0uAwnIlJ

Malware Config

Extracted

Family

lokibot

C2

http://63.250.44.84/cpanel.php?id=0154721716286636215019717878850975448529

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      004cc0803bb20bd71c217c0a7987420f3b6fffec022b6c1c1f20b87b86b1de9c

    • Size

      404KB

    • MD5

      4bdd7d8d5654613006b106e800fef483

    • SHA1

      d7ae5aa54cad9ffd8a7d2573e5eba2279cfa17c9

    • SHA256

      004cc0803bb20bd71c217c0a7987420f3b6fffec022b6c1c1f20b87b86b1de9c

    • SHA512

      f7310d21eff0700b0638768b4134ea0f43af634f7265eb20020a2759522fe83038d4c42ef30f44854a3e618808b2b9950da60898b357c151b060f67fc7045d5b

    • SSDEEP

      12288:PcI07ouHH1J+0wSocWeSG4Z5wKjpJqszz2R1g0:EYu1xocWhzwqPH2R1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks