General

  • Target

    28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe

  • Size

    270KB

  • Sample

    240725-cerq8svcpg

  • MD5

    2922c109e30c924b0bc979434cc36f52

  • SHA1

    4230742e046551ddc3145baf6ef5dcf99ba394f2

  • SHA256

    28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32

  • SHA512

    db12152c664d45b6c7fcec8b13d8984da75b2bce265e006d1c7e013ad7183ff050ecdc908224060c99ad801365412bd4abe220d4ae8d5c6b7c669f8b27b2016b

  • SSDEEP

    6144:E917J2Wor8Z4gPjdq5Q1a5Q75ybFvjyTLtnoa:EHTor8Z4gJGQp75qRy

Malware Config

Extracted

Family

lokibot

C2

http://164.90.194.235/?id=22044231991792986

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe

    • Size

      270KB

    • MD5

      2922c109e30c924b0bc979434cc36f52

    • SHA1

      4230742e046551ddc3145baf6ef5dcf99ba394f2

    • SHA256

      28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32

    • SHA512

      db12152c664d45b6c7fcec8b13d8984da75b2bce265e006d1c7e013ad7183ff050ecdc908224060c99ad801365412bd4abe220d4ae8d5c6b7c669f8b27b2016b

    • SSDEEP

      6144:E917J2Wor8Z4gPjdq5Q1a5Q75ybFvjyTLtnoa:EHTor8Z4gJGQp75qRy

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks