General

  • Target

    14ea26a775bf7cd9c438c726ec846bf9cdce4d76c918ad5ed3774376b0de3619.zip

  • Size

    16KB

  • Sample

    240710-krrwrszfra

  • MD5

    3d8c4b006882d42ba427296daf9b03e7

  • SHA1

    4e9dcba70e604b3014f3a482089cc78828ce10e4

  • SHA256

    bd27689033fb2448f157078ee6eee6f9d45d8e15852d715acedae72a95201a67

  • SHA512

    b68873b99ccb68fdd1fee045551516c5d8ff97866c8813aee13363caf30230548bd4ff6b7419c99fbefebba8b1a523bc84fbd51509a415f01d6b63bd75c8c1d7

  • SSDEEP

    384:/xfmoMRCppLJzJghg2vMD/tnRf/kj24aZ4Wr4fdN6XO:/xfYCppLJVgxvW/tnRf/kj24M4AOdNSO

Malware Config

Extracted

Family

lokibot

C2

http://dashboardproducts.info/bally/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      14ea26a775bf7cd9c438c726ec846bf9cdce4d76c918ad5ed3774376b0de3619.rtf

    • Size

      63KB

    • MD5

      f48645f93407473fccd3d921827b876e

    • SHA1

      9d81d6c22da289fc2b04c0f7cef803debccbf72d

    • SHA256

      14ea26a775bf7cd9c438c726ec846bf9cdce4d76c918ad5ed3774376b0de3619

    • SHA512

      dbf232cf00ad890c4710e1ec80c2c430d5aa7e252aac0b658e527d74eff3b4595ead6f784754aeaaf219b7323a7ee69bcfe06d5a1afaa3720ea44d5aae96cbf0

    • SSDEEP

      384:ueebxsoUZWX0ivcXPJd0QUSWXqzTJfF+alifsG+sgnBMdbuOTM:ueixsTwgPJqQUSilhfIshuOTM

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks