General

  • Target

    1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d.exe

  • Size

    512KB

  • Sample

    240717-v1pg4sthpe

  • MD5

    8a43a10dc1358f554584a7e8c5dfdf1a

  • SHA1

    421b526ab7b03c4fb1529af55074b4cf1fba30af

  • SHA256

    1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d

  • SHA512

    01bd26a75515bb6cb1e6c36bd23bb97c6dda28f6acebe40078a20d0caa865d48660cd66a1b22d404271f4fe818b90b2ddb8df0e984ad973c055e69972e871e5e

  • SSDEEP

    6144:RwgMufVBLKEbbfYeBxZGZ+fGvcaZYE6DMQRWXu9laoMBZXVseAzBL/1nW3r3CvEa:RwfufVLG+fGvqEQqBV2hWuhb

Malware Config

Extracted

Family

lokibot

C2

http://rocheholding.top/rudolph/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d.exe

    • Size

      512KB

    • MD5

      8a43a10dc1358f554584a7e8c5dfdf1a

    • SHA1

      421b526ab7b03c4fb1529af55074b4cf1fba30af

    • SHA256

      1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d

    • SHA512

      01bd26a75515bb6cb1e6c36bd23bb97c6dda28f6acebe40078a20d0caa865d48660cd66a1b22d404271f4fe818b90b2ddb8df0e984ad973c055e69972e871e5e

    • SSDEEP

      6144:RwgMufVBLKEbbfYeBxZGZ+fGvcaZYE6DMQRWXu9laoMBZXVseAzBL/1nW3r3CvEa:RwfufVLG+fGvqEQqBV2hWuhb

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks