General

  • Target

    PO#34316_20240528.rar

  • Size

    481KB

  • Sample

    240529-nv55cadb61

  • MD5

    0e62c6a37a663e40f6e50f372d1dbc42

  • SHA1

    98e67f14486ba43ad82cc2e3dcfcab21c539f0f3

  • SHA256

    6921540728f84fd30767501f0097c29242f33878a5953a583c0a59f0056494c3

  • SHA512

    5bc10dd7548f9df7f568c97660a238975ba8ef2565ca7ffa50ffac3d583733df1d8220caa6b644d8903739dad965e6e40c1a7ab9c2e2f9653a6426e8b3cc6780

  • SSDEEP

    12288:Q40pfb0RZ3NiDYRTHeUBptiVixCP1SLRhcIF0nkyO3SGuNnHTcU:qfb0RZ3wDYRTeUBP/e4ouRSFoU

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/t?id=090

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO#34316_20240528.exe

    • Size

      535KB

    • MD5

      14510710e98b064e69ecb55e956b2efe

    • SHA1

      8e4a25f4b78a9293e39bcfb67686e0e0a4e5873a

    • SHA256

      6dbe9a6e92e3962725c30e1533f195da33329b089a537557b1c3571225969191

    • SHA512

      76b3116a1deae0c18add797a8c078fa621303292abaeefcef3eb67e01ae2ea21945a272936a356e17bd4ac17b809b05fd6c90da6b67126bcf3827b5496789363

    • SSDEEP

      12288:+KcAV/xf4MbNpcFC1f41Vk6EjRlHs4vBqzkR:HOC1okFjHs453

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks