General

  • Target

    MalwareBazaar.3

  • Size

    750KB

  • Sample

    240802-p96j4axamk

  • MD5

    e9d26537e90ed16f25562af4e1f32d67

  • SHA1

    12815966f19753f9fa7035179138b449dc0281b3

  • SHA256

    f66e2b6d93b2fe125c0c770926286c63716cb0538bf4e4bf6c47eff67b39b207

  • SHA512

    0ecb24fe955c34fcf0ec3addb4813302c5fcc9c882ecbfcccb03c1657a94754073247d81d81f556e2ad3907adaa381a4607d12fc69dabd8637e09ba989941b31

  • SSDEEP

    12288:UcrNS33L10QdrXPMztnIQ0oZCkv6JkDTziH4nIAdL+tFiZsQTZjWR7Tyr5W4uO3w:vNA3R5drXPUtI0ZCkvTOUN+tFimQq7TR

Malware Config

Extracted

Family

lokibot

C2

http://94.156.66.169:5334/drhwttsg/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      MalwareBazaar.3

    • Size

      750KB

    • MD5

      e9d26537e90ed16f25562af4e1f32d67

    • SHA1

      12815966f19753f9fa7035179138b449dc0281b3

    • SHA256

      f66e2b6d93b2fe125c0c770926286c63716cb0538bf4e4bf6c47eff67b39b207

    • SHA512

      0ecb24fe955c34fcf0ec3addb4813302c5fcc9c882ecbfcccb03c1657a94754073247d81d81f556e2ad3907adaa381a4607d12fc69dabd8637e09ba989941b31

    • SSDEEP

      12288:UcrNS33L10QdrXPMztnIQ0oZCkv6JkDTziH4nIAdL+tFiZsQTZjWR7Tyr5W4uO3w:vNA3R5drXPUtI0ZCkvTOUN+tFimQq7TR

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks