General

  • Target

    85c0413d7d9487f752bd2b8271337606.exe

  • Size

    598KB

  • Sample

    240802-qndgvsxbkj

  • MD5

    85c0413d7d9487f752bd2b8271337606

  • SHA1

    4c684ec979fcbafd08331879fdbe0ba3e4c2c494

  • SHA256

    cc34009402c9e1a52c70b4f88a817c974a2fc454d4f1b7dbb3cdd21c24fbc073

  • SHA512

    277ee8f9928c12459df2d65afc96bd139c9593af08c2ca995cc5165cacafd8e0194b05aa618a43a12f9c04b64ff532979f8346784fe3b59a133c6a0bacd39aa6

  • SSDEEP

    12288:AcrNS33L10QdrX6X1n3apum4LIsXudBob4Z6lVSeJuBzUq26bUAd1:jNA3R5drXG13IutIBomEJocKUY

Malware Config

Extracted

Family

lokibot

C2

http://94.156.66.169:5734/topwttsg/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      85c0413d7d9487f752bd2b8271337606.exe

    • Size

      598KB

    • MD5

      85c0413d7d9487f752bd2b8271337606

    • SHA1

      4c684ec979fcbafd08331879fdbe0ba3e4c2c494

    • SHA256

      cc34009402c9e1a52c70b4f88a817c974a2fc454d4f1b7dbb3cdd21c24fbc073

    • SHA512

      277ee8f9928c12459df2d65afc96bd139c9593af08c2ca995cc5165cacafd8e0194b05aa618a43a12f9c04b64ff532979f8346784fe3b59a133c6a0bacd39aa6

    • SSDEEP

      12288:AcrNS33L10QdrX6X1n3apum4LIsXudBob4Z6lVSeJuBzUq26bUAd1:jNA3R5drXG13IutIBomEJocKUY

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks