General

  • Target

    4516944be6bb32f6a499dae6e1e8b973e8dcfb5b.zip

  • Size

    470KB

  • Sample

    240528-phmmxada5v

  • MD5

    8dc284db5cfdbaf263576a70b02fa180

  • SHA1

    b27a8206be6940aaec58cf7bfe83544ef24e8257

  • SHA256

    e52aa3f61ccaae900f29c3b55f77f0874a46940baec7af3e100bb21c1777a1f3

  • SHA512

    f92fcf020e71643f73c35d0c165aad2597c542c90b8fa2aff6e80de9143f6155898bf2fb0c652e73d2c863d817eed3f5ddd90db9fdb16c52ff08c1253a5a48fb

  • SSDEEP

    12288:zP9yPJjKGNM/VNXeTERu+T1WkLBDThqBcs+GabkLtnk67l6:zuJjTW2Tyu+hJgcELlP7Q

Malware Config

Extracted

Family

lokibot

C2

http://metallc.top/sath/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Hapag-Lloyd payment advice.exe

    • Size

      482KB

    • MD5

      a7238eb78e81eb4d885fa1768fc45543

    • SHA1

      7c2f559ec7de4c767c87992fc28c54050849bff8

    • SHA256

      66111967447c40fa6d06b045f856f635f5bb09092087a9ec89c939c0dcf5d938

    • SHA512

      6a62a4e1f4dd8534fdddd78ad4f3750be63d08398129e0211da2baece5844976837229f5ccb25aeadc06397f0f6c8f6a21ab01139e0cef4b4bea05948cdfd6fb

    • SSDEEP

      12288:I/6Mo012irk6h8lQXaWxxaw7MspkEkO0ye1E1:gocNk6k7WbYsqP/1+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks