General

  • Target

    dbdc2f5b2f7b338a4673cb4b5b207d72.bin

  • Size

    162KB

  • Sample

    240726-dzb2ysxakd

  • MD5

    983582de94ea083f43948676bfe9b783

  • SHA1

    bc1d29e1899f73d8ed2772a970e75f0d6c721815

  • SHA256

    cdc5752aa11d41d823c524fdc0fdb017402e2bdf1cbfd8794f723c71556f33cd

  • SHA512

    19556eb454f6c7a3f64f062b434f6f9b994c4ef49cb829359b672e14a006c4864c373306b2e7a3ae566a1fde5b5dca46be10ebc8a7e7a63536b7b889feef64eb

  • SSDEEP

    3072:euTk/VcIW98ejl8iHeiNZEiQuLrEBMcYg52PZQrAlpS8zAbL1RshVR3tt9W:fINgKi+iNIIrEBTISIU8EbLEhbP4

Malware Config

Extracted

Family

lokibot

C2

http://164.90.194.235/?id=17007285853618101

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476.exe

    • Size

      271KB

    • MD5

      dbdc2f5b2f7b338a4673cb4b5b207d72

    • SHA1

      9d939273f145ee1d05d226d44e1256ea45625e4f

    • SHA256

      d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476

    • SHA512

      235d2c120eda51a1f0652d7b44b12abe63e82f0d1a1ee4436eee9660fd8ec7f163167351743c46a1b7f3cafc92d5214c1c2a1baea8e41f22517896de87434489

    • SSDEEP

      3072:C072IS3LradTKvOypCmyGJOB9P4+5F0Ogp/fqzVkB9a5nLum2/ZWbjM+dlNR6tAm:kaRY/0jWt+MOgpfqCBKL4B6p+tA8JoX

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Credentials from Password Stores

1
T1555

Credentials from Web Browsers

1
T1555.003

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks