General

  • Target

    6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d.exe

  • Size

    617KB

  • Sample

    240603-bgs7eadf7w

  • MD5

    3386773652cab6d42e5eb77f33b414c2

  • SHA1

    46af3a4f285a71a1f27b67e79359d980612226b4

  • SHA256

    6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d

  • SHA512

    cd6f3a152ae82ea19686f83d26eac06e888dfe753bb8fc863570a2a1a6db3b9c5fedf910b71e2d40886c07d650c4b35faf69c1f322560bc67539728b9aceb7c2

  • SSDEEP

    12288:l2iKVaUqdJS4Vo5pLRpHiANQ6elKQI64i55oc:Y+UgSckQ61Qd4iToc

Malware Config

Extracted

Family

lokibot

C2

http://namex-na.com/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d.exe

    • Size

      617KB

    • MD5

      3386773652cab6d42e5eb77f33b414c2

    • SHA1

      46af3a4f285a71a1f27b67e79359d980612226b4

    • SHA256

      6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d

    • SHA512

      cd6f3a152ae82ea19686f83d26eac06e888dfe753bb8fc863570a2a1a6db3b9c5fedf910b71e2d40886c07d650c4b35faf69c1f322560bc67539728b9aceb7c2

    • SSDEEP

      12288:l2iKVaUqdJS4Vo5pLRpHiANQ6elKQI64i55oc:Y+UgSckQ61Qd4iToc

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing common artifacts observed in infostealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks