General

  • Target

    cdad057bf858cecb47bcf67d3b9fe985.bin

  • Size

    495KB

  • Sample

    240718-dy342staql

  • MD5

    6695728496c4c25e6ee3734c6adf307a

  • SHA1

    4ace60bc611cff6ad80061e8e1d841f8f0d2e619

  • SHA256

    4e8a04248dc70aa9a08c17b5b0606949374c938ad32b80a41d3394004ccff7c5

  • SHA512

    9f49cd748cb4acc6458b28bc27ddabea91a6ed3773abfd04a3a80ba15a745d63e8ef86d18072bc57b3292f6e21c93e7cb5bd226cfafb5603a812a43bbd57b329

  • SSDEEP

    12288:uu7YXmPkn7BwW5ibHZ0RfOt14t/8/8jzbbNsZJPf9PXOe:2XmPMSW5ibHZ0Nu/8zbCZBNee

Malware Config

Extracted

Family

lokibot

C2

http://verose.top/alpha/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      05f763c6293bbf6ea3cb055043265326f6d714b30b7032a6fcbe236bf46233d9.exe

    • Size

      520KB

    • MD5

      cdad057bf858cecb47bcf67d3b9fe985

    • SHA1

      0e51ac74967a4771cc5b0e0fa16039da7d1ad97b

    • SHA256

      05f763c6293bbf6ea3cb055043265326f6d714b30b7032a6fcbe236bf46233d9

    • SHA512

      4508956347171da74e06c8b7aa5dd6810d2d2923065a47ebd4790644729db39c4e3ea77ceaf36898515413fd7a10666987706fae293957ecbf8fd87f92117292

    • SSDEEP

      12288:KQdRlF6OB7cYznoRyTctRdJyzjDA/N0AJ7y0muakyLb5Z:fRv6OB42oRyTgyzjDA/iARmZkMdZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks