General

  • Target

    5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9

  • Size

    104KB

  • Sample

    240525-1643msda23

  • MD5

    5003a3a2bea2de1b60c021ecde3601da

  • SHA1

    95bd62acbb1f484d1c5d9b805688247b11b0b01c

  • SHA256

    5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9

  • SHA512

    cd93653a06f6adb2b34650ee6f220304b6e62847ff78bd6140e9e1641d0888d2dd7e1eefe9d76750e77922348f3a5aa7aab8ce96bc40d59376e864747db9cced

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqQIzmd:nSHIG6mQwGmfOQd8YhY0/E1UG

Malware Config

Extracted

Family

lokibot

C2

http://shopper.bulutlogistic.com/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9

    • Size

      104KB

    • MD5

      5003a3a2bea2de1b60c021ecde3601da

    • SHA1

      95bd62acbb1f484d1c5d9b805688247b11b0b01c

    • SHA256

      5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9

    • SHA512

      cd93653a06f6adb2b34650ee6f220304b6e62847ff78bd6140e9e1641d0888d2dd7e1eefe9d76750e77922348f3a5aa7aab8ce96bc40d59376e864747db9cced

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqQIzmd:nSHIG6mQwGmfOQd8YhY0/E1UG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing common artifacts observed in infostealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks