General

  • Target

    0d14aa04495533f14f8e95994bde686ee53be4ef3665dc951297ffd9d1863bee.rar

  • Size

    481KB

  • Sample

    240528-rf4vhshf45

  • MD5

    4336f735a039ce6593316dacc3fe05a2

  • SHA1

    2e05b59c714c7adc91a31d71075f940bb3fd02f7

  • SHA256

    0d14aa04495533f14f8e95994bde686ee53be4ef3665dc951297ffd9d1863bee

  • SHA512

    bfe886fb4cfef2e55b40aba9cdc5993a779b701f064e0bcc1cf23981d71ba961a18acec0b559e63a2344501dbafd6de3c7fa60fe197282b9d619d5742f35803a

  • SSDEEP

    12288:kyJHrhPQIro8jOSIYhKnjHVnhTTrnVD3M7rVjQ9di:kuHrpQqo8jaAuj1xrVD3MtQ9Y

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/t?id=090

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SC_TR23052024.exe

    • Size

      754KB

    • MD5

      8ed6f5c578a44b191a187624c4664d7b

    • SHA1

      834a8dd27f54f9c35045e34d8c0ac604516a3e12

    • SHA256

      fb94701002816ee47f78f3712fef111cb1e16aba754f1df4a9796746b836a39e

    • SHA512

      fa5e083b4480e329bf61cfa8e5faf1e4eed2d71c35c2422a3a5e267120b6087142d3cc569517957e7352d15f47a9977bf16e410e83fe78e166f1d441e028fd99

    • SSDEEP

      12288:b8+Ep9UQ8JibdmHrwOPLDbK8+FpeIdJqkR:b85p9UfIbULDbEeIdH

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks