General

  • Target

    4f547e1db3db224956a2de52f3486aa4faa87aefd481bf8a58f69c6423cb60af.exe

  • Size

    342KB

  • Sample

    240725-dcs2ysthkm

  • MD5

    771b54897012d3d29b5baaff3abad9a0

  • SHA1

    8242f2121425bca742b800d3cfb1882120d40051

  • SHA256

    4f547e1db3db224956a2de52f3486aa4faa87aefd481bf8a58f69c6423cb60af

  • SHA512

    f103172e925fb87aa12095dde808e2f9052f1aca18c618f9e4c43ba2cef0b8e2058881a8623c1e1c23042000cb77f1047eb7c4d317ec270e4bc7fd9ed5e21aef

  • SSDEEP

    6144:9mqZEKFVpQQC1rLzpktU58xsWhK30kvnigabwVfsxv:9mq9FVpoXpktdMiBx

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/gk20/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4f547e1db3db224956a2de52f3486aa4faa87aefd481bf8a58f69c6423cb60af.exe

    • Size

      342KB

    • MD5

      771b54897012d3d29b5baaff3abad9a0

    • SHA1

      8242f2121425bca742b800d3cfb1882120d40051

    • SHA256

      4f547e1db3db224956a2de52f3486aa4faa87aefd481bf8a58f69c6423cb60af

    • SHA512

      f103172e925fb87aa12095dde808e2f9052f1aca18c618f9e4c43ba2cef0b8e2058881a8623c1e1c23042000cb77f1047eb7c4d317ec270e4bc7fd9ed5e21aef

    • SSDEEP

      6144:9mqZEKFVpQQC1rLzpktU58xsWhK30kvnigabwVfsxv:9mq9FVpoXpktdMiBx

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks