General

  • Target

    9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7.exe

  • Size

    573KB

  • Sample

    240601-wv39rabd52

  • MD5

    69767efcfefe680cf0332030e9bf1630

  • SHA1

    99e23c596a2c5b8b4f1b8b969d0f966e21082f5d

  • SHA256

    9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7

  • SHA512

    1bccb3f8ccacb6e29c3191d828895db7994023522832e13e859eedfa79df27361f24577c588424bd44f90214dbe22163cf88f735c203bc250e44b72e5a7a7fa9

  • SSDEEP

    12288:ePOVEwgF05/FwmXAtcp7ejh/rJd98WR0cIKuWhQWsmgvezkR:buPq/CXcp7mh/rJdCW7uWeLme

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/t?id=090

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7.exe

    • Size

      573KB

    • MD5

      69767efcfefe680cf0332030e9bf1630

    • SHA1

      99e23c596a2c5b8b4f1b8b969d0f966e21082f5d

    • SHA256

      9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7

    • SHA512

      1bccb3f8ccacb6e29c3191d828895db7994023522832e13e859eedfa79df27361f24577c588424bd44f90214dbe22163cf88f735c203bc250e44b72e5a7a7fa9

    • SSDEEP

      12288:ePOVEwgF05/FwmXAtcp7ejh/rJd98WR0cIKuWhQWsmgvezkR:buPq/CXcp7mh/rJdCW7uWeLme

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks