General

  • Target

    c19b70dbb4f6b4c1d33175598d82df4fd0798955a6c26a3d5f787cfc5566734c.exe

  • Size

    549KB

  • Sample

    240716-yc8smazcqd

  • MD5

    8842ebb96a902d9dc28296d45abbbf53

  • SHA1

    4a1a850f093f2f97a7afabe0a8bdb33fed886fc8

  • SHA256

    c19b70dbb4f6b4c1d33175598d82df4fd0798955a6c26a3d5f787cfc5566734c

  • SHA512

    7e38b1a428d637d16c8279f17e2a13723d7b5a888cb038505e9e0956c060a31923f7533f9547743da89e6ba676b1874f13920f86968af94518c2de522d9f2b9b

  • SSDEEP

    12288:hWx2PQf4yXNhszFwUBpfKC0+FC/DJMIcCEyIHgxBVb5bKvYqkR:8wMbNGzFwUBpfM+ElMD1MdbW2

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/wp?s=831

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c19b70dbb4f6b4c1d33175598d82df4fd0798955a6c26a3d5f787cfc5566734c.exe

    • Size

      549KB

    • MD5

      8842ebb96a902d9dc28296d45abbbf53

    • SHA1

      4a1a850f093f2f97a7afabe0a8bdb33fed886fc8

    • SHA256

      c19b70dbb4f6b4c1d33175598d82df4fd0798955a6c26a3d5f787cfc5566734c

    • SHA512

      7e38b1a428d637d16c8279f17e2a13723d7b5a888cb038505e9e0956c060a31923f7533f9547743da89e6ba676b1874f13920f86968af94518c2de522d9f2b9b

    • SSDEEP

      12288:hWx2PQf4yXNhszFwUBpfKC0+FC/DJMIcCEyIHgxBVb5bKvYqkR:8wMbNGzFwUBpfM+ElMD1MdbW2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks