General

  • Target

    592f2fd24fbb38b490ee2c4527395bb7.exe

  • Size

    604KB

  • Sample

    240703-hlxtqasana

  • MD5

    592f2fd24fbb38b490ee2c4527395bb7

  • SHA1

    1707db4d251d316f9749a8a96c47f94d1784d24e

  • SHA256

    e61c55bebdde9bf6dbfccb5cbee08d10d4147b71496624e6d1a220f8bcd7ca4c

  • SHA512

    de7956db99e26b4adbfb5cdb53e0af44ec309ae602d8d59717aa981470452ec6e45629919212d66fbcdc4324eab4e8641d8d6c7d2164427baadab72f75b7723e

  • SSDEEP

    12288:Xuq6JNf+w7fxmhpdScwAffoQOr28W9GJDgDBysGzo6:YJtchjScWzShhV+/

Malware Config

Extracted

Family

lokibot

C2

http://dashboardproducts.info/bally/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      592f2fd24fbb38b490ee2c4527395bb7.exe

    • Size

      604KB

    • MD5

      592f2fd24fbb38b490ee2c4527395bb7

    • SHA1

      1707db4d251d316f9749a8a96c47f94d1784d24e

    • SHA256

      e61c55bebdde9bf6dbfccb5cbee08d10d4147b71496624e6d1a220f8bcd7ca4c

    • SHA512

      de7956db99e26b4adbfb5cdb53e0af44ec309ae602d8d59717aa981470452ec6e45629919212d66fbcdc4324eab4e8641d8d6c7d2164427baadab72f75b7723e

    • SSDEEP

      12288:Xuq6JNf+w7fxmhpdScwAffoQOr28W9GJDgDBysGzo6:YJtchjScWzShhV+/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks