General

  • Target

    a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b

  • Size

    590KB

  • Sample

    240707-y5g6dazdra

  • MD5

    642cdac6ce35381998ddae29ad0fbe03

  • SHA1

    a1cbafd24c126ca211217a89ab766ea404db0207

  • SHA256

    a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b

  • SHA512

    2910fad839cc8dfa1307bff41a2c213bd233c4d607d1206245a25fde792f960b588f139d714986b9d9f4bda5d8d74917907658e86fe7df82fd289352a6353a22

  • SSDEEP

    12288:rM3Gy5luj4VWCs5zNiA4L6acLvI+zv9FH9n5d1o+:evuj4VWl5zwA+2QGvndy

Malware Config

Extracted

Family

lokibot

C2

http://dashboardproducts.info/bally/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b

    • Size

      590KB

    • MD5

      642cdac6ce35381998ddae29ad0fbe03

    • SHA1

      a1cbafd24c126ca211217a89ab766ea404db0207

    • SHA256

      a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b

    • SHA512

      2910fad839cc8dfa1307bff41a2c213bd233c4d607d1206245a25fde792f960b588f139d714986b9d9f4bda5d8d74917907658e86fe7df82fd289352a6353a22

    • SSDEEP

      12288:rM3Gy5luj4VWCs5zNiA4L6acLvI+zv9FH9n5d1o+:evuj4VWl5zwA+2QGvndy

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks