General

  • Target

    a8fbdf30ea6c2123df0a50d5e4e6419a.exe

  • Size

    367KB

  • Sample

    240806-16rsbasdpp

  • MD5

    a8fbdf30ea6c2123df0a50d5e4e6419a

  • SHA1

    596e543b3336b7bd64638eae9dd85bc7f8fbf771

  • SHA256

    872593063b4fad7b6355ee53d4f4017320851167b18311674e8869d983191d82

  • SHA512

    1403dd5427e969d0925447acdabfa177c33187fe30fd6a99774a19bdbc68dae37da4f8f3294d4db724ad49bb85930be9666b42c22beed8b1343825b704233d55

  • SSDEEP

    6144:k82Jsht3YefQ+X/nHmHiHLuW6MoF9dSll3jUjjqrBv4h/vXNi66ZjNztsbSDDX+8:k82KhnfQqHFLzoYP0jq1Y/v8bjNztsbs

Malware Config

Extracted

Family

lokibot

C2

http://94.156.66.169:5788/bhvstgd/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a8fbdf30ea6c2123df0a50d5e4e6419a.exe

    • Size

      367KB

    • MD5

      a8fbdf30ea6c2123df0a50d5e4e6419a

    • SHA1

      596e543b3336b7bd64638eae9dd85bc7f8fbf771

    • SHA256

      872593063b4fad7b6355ee53d4f4017320851167b18311674e8869d983191d82

    • SHA512

      1403dd5427e969d0925447acdabfa177c33187fe30fd6a99774a19bdbc68dae37da4f8f3294d4db724ad49bb85930be9666b42c22beed8b1343825b704233d55

    • SSDEEP

      6144:k82Jsht3YefQ+X/nHmHiHLuW6MoF9dSll3jUjjqrBv4h/vXNi66ZjNztsbSDDX+8:k82KhnfQqHFLzoYP0jq1Y/v8bjNztsbs

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks