General

  • Target

    0e62c6a37a663e40f6e50f372d1dbc42.bin

  • Size

    481KB

  • Sample

    240531-bdrjeaaa73

  • MD5

    ddc1287cd832c295438dcee37152db5d

  • SHA1

    d997ada27a277c4f67ab6b90434245c948ee30ee

  • SHA256

    de4945ea381280857c49980d51dc793cc789e70fd3a2ecb95eb62ebbfab6e26e

  • SHA512

    a9ea8e59cbfbde96ea64a632fa2d03e401736704123673f035cc5a1a57c233c2e4c8250987eb78855707d9d51fb70b3d5c4c77bdca1905d7219631fc8209b399

  • SSDEEP

    12288:5MucJDYs8s8XeFDarBueCBr5E+/qySBEbMQ:5yJEsf8uFqBueCBa1ySG4Q

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/t?id=090

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO#34316_20240528.exe

    • Size

      535KB

    • MD5

      14510710e98b064e69ecb55e956b2efe

    • SHA1

      8e4a25f4b78a9293e39bcfb67686e0e0a4e5873a

    • SHA256

      6dbe9a6e92e3962725c30e1533f195da33329b089a537557b1c3571225969191

    • SHA512

      76b3116a1deae0c18add797a8c078fa621303292abaeefcef3eb67e01ae2ea21945a272936a356e17bd4ac17b809b05fd6c90da6b67126bcf3827b5496789363

    • SSDEEP

      12288:+KcAV/xf4MbNpcFC1f41Vk6EjRlHs4vBqzkR:HOC1okFjHs453

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks