General

  • Target

    98c6fb4cb9e723b5f1c808712eec0d52.bin

  • Size

    528KB

  • Sample

    240601-c786zsfh57

  • MD5

    fa0a80d156983a6e8a20a200d97580d5

  • SHA1

    bd29e7ce4ff0eb7546b4508e89ee6ef0d5f3b399

  • SHA256

    e9ae7183c796ed8b84ba7fd22f3d288f7d1d282950918fc679290d83d73643c6

  • SHA512

    faf0b01e22cc89f676cce48121fd88ff51ca0a84e5c542fb4633aa54996fe68164fa8564c4eb55964db7e14ba17f4f30f0e4d6a3fb222d0b44555ce60c7b2f43

  • SSDEEP

    12288:purH7gi0yKhtowz9hMKyvLCrUdtU9Wf5bw6ZPwmQ:kr8qIXzoLC/Mxb3ih

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/d1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a.exe

    • Size

      552KB

    • MD5

      98c6fb4cb9e723b5f1c808712eec0d52

    • SHA1

      e0f59529bd07ed6cd1c930eb8cffe008347ce5e3

    • SHA256

      dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a

    • SHA512

      85575ff05bc97af529210223f315444fcc1cdb89374ba3e01144212c6914ba5b93fc88e03e730e55943bd4eb507bfb194e0f67abfec9d1bc17ca9e46def106eb

    • SSDEEP

      12288:ZTJKksdrJwKcIg2gcFS7rC+bPPxzhPwN0K9lb6ed:GcIgcFQrC+D1SN0KXb6

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks