General

  • Target

    Potvrda.cmd

  • Size

    646KB

  • Sample

    240820-m5srbsxgra

  • MD5

    d99da007ef029c7095f13fa6afb4354b

  • SHA1

    861a6fe8b6700939140e01d8942f49e5910f6b23

  • SHA256

    5a83612951037202043aca608915706396f3253433393ec0589999b1ccd16acd

  • SHA512

    2eb29eaffefe37893a515f80fc5cd8688fa7e02057ecc7029073aaf278f071f4f0752cb5a0848222a2002559d24edf7f1b675c90a4d12d3717935f5cdcc14ba2

  • SSDEEP

    12288:LaHiMd6OdKEari+FjzES4Do/leUvE+gEI7veLGxSSxtkR:WHH6h1O2XES4sMp+5I76ISSy

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/modify?file=1

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Potvrda.cmd

    • Size

      646KB

    • MD5

      d99da007ef029c7095f13fa6afb4354b

    • SHA1

      861a6fe8b6700939140e01d8942f49e5910f6b23

    • SHA256

      5a83612951037202043aca608915706396f3253433393ec0589999b1ccd16acd

    • SHA512

      2eb29eaffefe37893a515f80fc5cd8688fa7e02057ecc7029073aaf278f071f4f0752cb5a0848222a2002559d24edf7f1b675c90a4d12d3717935f5cdcc14ba2

    • SSDEEP

      12288:LaHiMd6OdKEari+FjzES4Do/leUvE+gEI7veLGxSSxtkR:WHH6h1O2XES4sMp+5I76ISSy

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks