General

  • Target

    d04e3afdf752a979f7816b37bf069bb2e58c4c9b67a1d120ba3450eb2331e6ea.exe

  • Size

    556KB

  • Sample

    240601-yjtbhsdb6t

  • MD5

    34136b62451498cf8e6cee5214f85aab

  • SHA1

    bc759abcd613089b5da71fe68cfcb850360ef884

  • SHA256

    d04e3afdf752a979f7816b37bf069bb2e58c4c9b67a1d120ba3450eb2331e6ea

  • SHA512

    c914f7573bfb849658694d4bd2f6177c79873adbba26cd18212fd6f31e3f24dd47c3facc5fb833a887748ca21c94bd2032f282df859b410a5452a61756b89ec8

  • SSDEEP

    12288:gPOCe+lcAv1NJzlV1GfSroM018lRNhZJypOWS77:BBAtNjSKrv48lRCS

Malware Config

Extracted

Family

lokibot

C2

http://tampabayllc.top/moore/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d04e3afdf752a979f7816b37bf069bb2e58c4c9b67a1d120ba3450eb2331e6ea.exe

    • Size

      556KB

    • MD5

      34136b62451498cf8e6cee5214f85aab

    • SHA1

      bc759abcd613089b5da71fe68cfcb850360ef884

    • SHA256

      d04e3afdf752a979f7816b37bf069bb2e58c4c9b67a1d120ba3450eb2331e6ea

    • SHA512

      c914f7573bfb849658694d4bd2f6177c79873adbba26cd18212fd6f31e3f24dd47c3facc5fb833a887748ca21c94bd2032f282df859b410a5452a61756b89ec8

    • SSDEEP

      12288:gPOCe+lcAv1NJzlV1GfSroM018lRNhZJypOWS77:BBAtNjSKrv48lRCS

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks