General

  • Target

    Maersk_Gio9yurHsEB0b9r.exe

  • Size

    552KB

  • Sample

    240530-nwqfaaga9w

  • MD5

    98c6fb4cb9e723b5f1c808712eec0d52

  • SHA1

    e0f59529bd07ed6cd1c930eb8cffe008347ce5e3

  • SHA256

    dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a

  • SHA512

    85575ff05bc97af529210223f315444fcc1cdb89374ba3e01144212c6914ba5b93fc88e03e730e55943bd4eb507bfb194e0f67abfec9d1bc17ca9e46def106eb

  • SSDEEP

    12288:ZTJKksdrJwKcIg2gcFS7rC+bPPxzhPwN0K9lb6ed:GcIgcFQrC+D1SN0KXb6

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/d1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Maersk_Gio9yurHsEB0b9r.exe

    • Size

      552KB

    • MD5

      98c6fb4cb9e723b5f1c808712eec0d52

    • SHA1

      e0f59529bd07ed6cd1c930eb8cffe008347ce5e3

    • SHA256

      dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a

    • SHA512

      85575ff05bc97af529210223f315444fcc1cdb89374ba3e01144212c6914ba5b93fc88e03e730e55943bd4eb507bfb194e0f67abfec9d1bc17ca9e46def106eb

    • SSDEEP

      12288:ZTJKksdrJwKcIg2gcFS7rC+bPPxzhPwN0K9lb6ed:GcIgcFQrC+D1SN0KXb6

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks