General

  • Target

    5953963046133560cdd678479c39cad1.bin

  • Size

    500KB

  • Sample

    240819-bqv3cswelb

  • MD5

    6568cc942ea2b1ea1581c9d2420d7c8a

  • SHA1

    1f3c3003fd4c47aca6dc101445e94f7d9d4a426b

  • SHA256

    be19e39c3efdb091aaea0bdb4101e2a2574e42f9478ac627cf309c7e011fca11

  • SHA512

    4f7b42533479dfb62e478bc7bf3d84d5e362d0014a39071841321c3996357c1d897e8be7802906c8812167bb472416394629a81c7b68d809269457603185f0f4

  • SSDEEP

    12288:UFs5WswDKDwF9d7HLRkjVeWk8z6xzVC7gQ35L5O06fBXnwlHEI:Ui4sWKDUWe0s5Cr804nIx

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/17008709

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823.exe

    • Size

      511KB

    • MD5

      5953963046133560cdd678479c39cad1

    • SHA1

      0dee9eb9b2f30f6eb00104fd45b06bbb02751c0e

    • SHA256

      d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823

    • SHA512

      c89eb65693cd144b89afd8f3a69a06396aaf15c9846ae773c2d8e555257653d8fa7743e659ca69c17b02f0b5ea915ae6372da00ff8479a91993f2b392f986483

    • SSDEEP

      12288:ZGNBzT3qqKHAw/dAAmy3F2DQtLfjRFgro0pPaRtCWg:UfzT3bKgw/dAAmmFcQ1fjsDWg

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks