General

  • Target

    c6134dc8d4cb365309ce031501eb322ab4d4731465bd7e1fb75421ac7f2c6734.exe

  • Size

    597KB

  • Sample

    240828-cqssnssfrj

  • MD5

    db19845d99d3dd9e60dcfdf810b9ce45

  • SHA1

    401bfd7063515b6eeec60a97d84939d0dc087bc6

  • SHA256

    c6134dc8d4cb365309ce031501eb322ab4d4731465bd7e1fb75421ac7f2c6734

  • SHA512

    429aa2bfb4fab09ad40bb0a6200c59b873810c2df0b8f986fd81501ea4c1c03581e29dedb7c2a0590c77e1cd247e290d74f7f87d26d8db6b54e0b39cc8035805

  • SSDEEP

    6144:xTDErFMmH8Sj3fzzQxFajJ162x7NBYvDbG/hrsBspChm51aop1t+uqmSR/KIg4pc:Ju/jvIGc2tN7h1F7LMK2pzactbs6kR

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/pages?id=281164463123697

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c6134dc8d4cb365309ce031501eb322ab4d4731465bd7e1fb75421ac7f2c6734.exe

    • Size

      597KB

    • MD5

      db19845d99d3dd9e60dcfdf810b9ce45

    • SHA1

      401bfd7063515b6eeec60a97d84939d0dc087bc6

    • SHA256

      c6134dc8d4cb365309ce031501eb322ab4d4731465bd7e1fb75421ac7f2c6734

    • SHA512

      429aa2bfb4fab09ad40bb0a6200c59b873810c2df0b8f986fd81501ea4c1c03581e29dedb7c2a0590c77e1cd247e290d74f7f87d26d8db6b54e0b39cc8035805

    • SSDEEP

      6144:xTDErFMmH8Sj3fzzQxFajJ162x7NBYvDbG/hrsBspChm51aop1t+uqmSR/KIg4pc:Ju/jvIGc2tN7h1F7LMK2pzactbs6kR

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks