General

  • Target

    2740-14-0x0000000000290000-0x0000000000332000-memory.dmp

  • Size

    648KB

  • Sample

    240806-fnqr3sthpa

  • MD5

    9c4a9c0ca85cae199e6342491bdddd31

  • SHA1

    5996b54c6c3662f100dc5b4ed8b4e014daaa2746

  • SHA256

    d6c8d5b7944bc816aadd9aa11a3326256574d9c7c326d90b223051382c32d83f

  • SHA512

    4e4b2814b41ad31e960132b5da41a1d7bcfc16bea99158e0ee9ae3afe35de73c62632ed52bd9fc8c8e54f0291c3a373a56e11140c32df1937bd8ed6c565a83c4

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/d2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2740-14-0x0000000000290000-0x0000000000332000-memory.dmp

    • Size

      648KB

    • MD5

      9c4a9c0ca85cae199e6342491bdddd31

    • SHA1

      5996b54c6c3662f100dc5b4ed8b4e014daaa2746

    • SHA256

      d6c8d5b7944bc816aadd9aa11a3326256574d9c7c326d90b223051382c32d83f

    • SHA512

      4e4b2814b41ad31e960132b5da41a1d7bcfc16bea99158e0ee9ae3afe35de73c62632ed52bd9fc8c8e54f0291c3a373a56e11140c32df1937bd8ed6c565a83c4

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks