General

  • Target

    a1ae48f33cc3de8406f8dacf5c725170b7921473308af2756939933500ea7773.ace

  • Size

    491KB

  • Sample

    240829-cbq1jazcnk

  • MD5

    f5b00636853231785277e324d4dc8403

  • SHA1

    8c00f181fd6fba31014b1bad481c7b10e424b081

  • SHA256

    a1ae48f33cc3de8406f8dacf5c725170b7921473308af2756939933500ea7773

  • SHA512

    8a664db85bab779b9e26b060c59fdb6cd16518a1a04561056ff714aae8e208cf6fe35276090039dc9c0eff2314ac7f3e5b334f4dd524602e77d26f0e81bbe49f

  • SSDEEP

    6144:n/zvi+VSXH7BnOBIKpINZw8V7Ao3r0wVfHINXxBVDA13JrSQsSIsKcMyEZ+kqo:n/LwXH7BOBGNyM77r0QANXhGJGhSC

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/edit.php?name=1

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      FedEx_AWB#53052032046.exe

    • Size

      548KB

    • MD5

      62fe99f8cb2b1509d892598a17ed9459

    • SHA1

      96db51d788e67579941fbabea7864776c8df43b9

    • SHA256

      7e10d81df9a9375a62ba1fab5eaee1db35d6f1ddf942518a534e0607f6032f84

    • SHA512

      07498ec1088bda1ce8a7abbb24a9e45a69e27f8533753f3f1638cfb471b3e2983e9a4c6a8b0821aed9bd3e36bf4a37682bfefc83a23351b4d74c37c414e0721a

    • SSDEEP

      12288:IoL3rlW4ipJyiTkGH3klntLbfGajnliDCOcUucwIt/BVxY0kR:7vGii0lhLf7l9OfwqZVmz

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks