General

  • Target

    e44f18c0c7c0ef5103adb70ea9797794.bin

  • Size

    528KB

  • Sample

    240727-ee82maydng

  • MD5

    a23a844b8dd66bb8629e1aa357aab677

  • SHA1

    88ac1d58ec2d7a28b52f28424a78a4070b29f9a4

  • SHA256

    24d8839c73ca7fa9b63855bc144ae94e04327a99be7a6e1ab135d5f22fa39835

  • SHA512

    d032e8811f37c2248b8c7f083c3c1a0d0de773dbf9a4c775132579233ab21f706090d252f3d1a2483a9bf966cc0161b3ae2859b90a2431dba313847d129101ed

  • SSDEEP

    12288:64F/9uEQkf5086qtPDrwkhMUFs/3l6szRXVuD:66/9uJkBT9I3UW3IszRXi

Malware Config

Extracted

Family

lokibot

C2

http://45.61.136.20/index.php/jlbcyg0q595vs4hef0

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ce03ff47b601e4154e103927e9b8e9f9f54f18653fe4bebf0a25f6458009dc0d.exe

    • Size

      583KB

    • MD5

      e44f18c0c7c0ef5103adb70ea9797794

    • SHA1

      e96882549e5ca1bc3cbedf276a3b0dc2e74b7c1c

    • SHA256

      ce03ff47b601e4154e103927e9b8e9f9f54f18653fe4bebf0a25f6458009dc0d

    • SHA512

      3facc779735f5132569dd413191add13333a28d476c9adf3119773af3f6f5a36f1a5a1f768bb2c40c563c10c6574a4556a97755ec36eacb8e5d471341a067277

    • SSDEEP

      12288:LsHzOUNUSB/o5LsI1uwajJ5yvv1l2WmynaFDoml:6iUmSB/o5d1ubcvnA5oo

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks