General

  • Target

    380c7dbc14694612579e89d5db0fad40_NeikiAnalytics.exe

  • Size

    104KB

  • Sample

    240528-hxwe2abe96

  • MD5

    380c7dbc14694612579e89d5db0fad40

  • SHA1

    318a579414cffd4103dfc6c41833f60c60485674

  • SHA256

    9f2601f5a92fb8deb62424307ce6638108c48053f41eb07559218dea16998143

  • SHA512

    6db3aafdb129f61f5861d9867e75fe99125aad878847f13514d957db9f921cd34a7d5e927633526a0b2a7f201ff66dff8b273819437d3fabfa16b7f4d6347cc7

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq0Izmd:nSHIG6mQwGmfOQd8YhY0/EZUG

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/office2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      380c7dbc14694612579e89d5db0fad40_NeikiAnalytics.exe

    • Size

      104KB

    • MD5

      380c7dbc14694612579e89d5db0fad40

    • SHA1

      318a579414cffd4103dfc6c41833f60c60485674

    • SHA256

      9f2601f5a92fb8deb62424307ce6638108c48053f41eb07559218dea16998143

    • SHA512

      6db3aafdb129f61f5861d9867e75fe99125aad878847f13514d957db9f921cd34a7d5e927633526a0b2a7f201ff66dff8b273819437d3fabfa16b7f4d6347cc7

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq0Izmd:nSHIG6mQwGmfOQd8YhY0/EZUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks