General

  • Target

    1dacd6e77760417a8650c79610f22589.bin

  • Size

    527KB

  • Sample

    240825-bc823a1dqk

  • MD5

    8acb2a4ec6f0899f7cde41d56dca22f2

  • SHA1

    7fca7118f313e34a646d27c659f184c3343f2866

  • SHA256

    df966df2346afa300c85db9ad25b686bf50645bf45985b2718ae2440f4028f6f

  • SHA512

    5f3885b7f006f023956198dcd5dd23d129ac78026258bc17b747fde25b735ddc9cfa6423cb9966a1f363304bb52d2df4b2dc29de56f6c7228399998a435b237a

  • SSDEEP

    12288:GZH6yQ1FWH5GTUd3DncYfPxGDIYQnv7BXRAaCCHw:HtADjf5yQnjBhPDQ

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/edit.php?name=1

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4ebdea4aa3734e9ebaea310b1a7fa600b5d9f3e489c61dbe7b3e2a3ab98d48c2.exe

    • Size

      592KB

    • MD5

      1dacd6e77760417a8650c79610f22589

    • SHA1

      a11239f07a926a0b9b8e16f3abc852965ba0c62e

    • SHA256

      4ebdea4aa3734e9ebaea310b1a7fa600b5d9f3e489c61dbe7b3e2a3ab98d48c2

    • SHA512

      04cf28b2334d15675eeeb8c7486aa97011ba90f04bf62bccb2def301964de05f2d961a76904e9221cb643f9cbeab08542145d26699c37bea6854d2be9515b661

    • SSDEEP

      12288:20bRl+NivA8WCiXD2mzq+5+HfN7hxZ4rfuxUs2YupkEPkR:2Sl2xmiXimzPYF7hxKrfu76ip

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks