General

  • Target

    LisectAVT_2403002B_326.exe

  • Size

    1.1MB

  • Sample

    240725-bmcfvaygjr

  • MD5

    aab9b233609d2255c122d73097861d9a

  • SHA1

    a01431f655c7c926782182598bdf0e38c2df92e2

  • SHA256

    f9e5cce1f80f585905e314bb5a51926f309eeb87244b1fdb95adf17fbe57b0b1

  • SHA512

    1fe6c730f9f58ff6749bde9a63aae36e10e02316fe52561483341b3e657e367191bcab2ff7eff10d965365da424b7d0979021073c6c5f00bafe9569aaa8bba9e

  • SSDEEP

    24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8aLF/IcUuJ94fdFc:oTvC/MTQYxsWR7aLFRUuiF

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/c3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      LisectAVT_2403002B_326.exe

    • Size

      1.1MB

    • MD5

      aab9b233609d2255c122d73097861d9a

    • SHA1

      a01431f655c7c926782182598bdf0e38c2df92e2

    • SHA256

      f9e5cce1f80f585905e314bb5a51926f309eeb87244b1fdb95adf17fbe57b0b1

    • SHA512

      1fe6c730f9f58ff6749bde9a63aae36e10e02316fe52561483341b3e657e367191bcab2ff7eff10d965365da424b7d0979021073c6c5f00bafe9569aaa8bba9e

    • SSDEEP

      24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8aLF/IcUuJ94fdFc:oTvC/MTQYxsWR7aLFRUuiF

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks