General

  • Target

    PO 67854.exe

  • Size

    557KB

  • Sample

    240726-hqb3tasfkm

  • MD5

    bb12506f8b9ea1550c8c09fdb754f747

  • SHA1

    4a90dcdfcef57f4052d38257cac5e392ffa329ff

  • SHA256

    ee98f6ee8e92f87f03ff4d3c5764a3b8d384aa0130ce1e7a4d77bd091e8beea3

  • SHA512

    260726f643a6c3d5a8d1a46abce9b7ef68352bf465b6049e01bd1e4811b5638ca11e0020314be96ce60ed5228d87cab6caed677e009f2db36b4762705d33ddc5

  • SSDEEP

    12288:MsHzOUNUSB/o5LsI1uwajJ5yvv1l2Yojq6bCiBbzl4:PiUmSB/o5d1ubcvtojJCiO

Malware Config

Extracted

Family

lokibot

C2

http://45.61.136.20/index.php/jlbcyg0q595vs4hef0

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO 67854.exe

    • Size

      557KB

    • MD5

      bb12506f8b9ea1550c8c09fdb754f747

    • SHA1

      4a90dcdfcef57f4052d38257cac5e392ffa329ff

    • SHA256

      ee98f6ee8e92f87f03ff4d3c5764a3b8d384aa0130ce1e7a4d77bd091e8beea3

    • SHA512

      260726f643a6c3d5a8d1a46abce9b7ef68352bf465b6049e01bd1e4811b5638ca11e0020314be96ce60ed5228d87cab6caed677e009f2db36b4762705d33ddc5

    • SSDEEP

      12288:MsHzOUNUSB/o5LsI1uwajJ5yvv1l2Yojq6bCiBbzl4:PiUmSB/o5d1ubcvtojJCiO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Credentials from Password Stores

1
T1555

Credentials from Web Browsers

1
T1555.003

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Collection

Email Collection

1
T1114

Tasks