General

  • Target

    PO#34316_20240528.exe

  • Size

    535KB

  • Sample

    240529-k5la5shf7y

  • MD5

    14510710e98b064e69ecb55e956b2efe

  • SHA1

    8e4a25f4b78a9293e39bcfb67686e0e0a4e5873a

  • SHA256

    6dbe9a6e92e3962725c30e1533f195da33329b089a537557b1c3571225969191

  • SHA512

    76b3116a1deae0c18add797a8c078fa621303292abaeefcef3eb67e01ae2ea21945a272936a356e17bd4ac17b809b05fd6c90da6b67126bcf3827b5496789363

  • SSDEEP

    12288:+KcAV/xf4MbNpcFC1f41Vk6EjRlHs4vBqzkR:HOC1okFjHs453

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/t?id=090

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO#34316_20240528.exe

    • Size

      535KB

    • MD5

      14510710e98b064e69ecb55e956b2efe

    • SHA1

      8e4a25f4b78a9293e39bcfb67686e0e0a4e5873a

    • SHA256

      6dbe9a6e92e3962725c30e1533f195da33329b089a537557b1c3571225969191

    • SHA512

      76b3116a1deae0c18add797a8c078fa621303292abaeefcef3eb67e01ae2ea21945a272936a356e17bd4ac17b809b05fd6c90da6b67126bcf3827b5496789363

    • SSDEEP

      12288:+KcAV/xf4MbNpcFC1f41Vk6EjRlHs4vBqzkR:HOC1okFjHs453

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks