General

  • Target

    9501bb27c1c43c5537c6d58899b168e946eebf1a557c3c779760b080928978bf.exe

  • Size

    527KB

  • Sample

    240830-cdvfqstbqn

  • MD5

    03940c4805b29f88a21df44bac7ed414

  • SHA1

    4132d5a0897b22f36ba84d5707a658f8ff2dd247

  • SHA256

    9501bb27c1c43c5537c6d58899b168e946eebf1a557c3c779760b080928978bf

  • SHA512

    9f473aae1913d290111ef3bd0241674dbf6c8deeb4268b698319190f00d68f4993c0f4ac9a983969aa78e0faf8d99baf02be1c1fb4c72f3e6675a62c13632b66

  • SSDEEP

    12288:4OVVI1L5HZtXTkHKwbpJ+WGGzXBXhfTK7eNNTDrFi6gikR:4wqLXt6zpGGNXsivQP

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/pages?id=281164463123697

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9501bb27c1c43c5537c6d58899b168e946eebf1a557c3c779760b080928978bf.exe

    • Size

      527KB

    • MD5

      03940c4805b29f88a21df44bac7ed414

    • SHA1

      4132d5a0897b22f36ba84d5707a658f8ff2dd247

    • SHA256

      9501bb27c1c43c5537c6d58899b168e946eebf1a557c3c779760b080928978bf

    • SHA512

      9f473aae1913d290111ef3bd0241674dbf6c8deeb4268b698319190f00d68f4993c0f4ac9a983969aa78e0faf8d99baf02be1c1fb4c72f3e6675a62c13632b66

    • SSDEEP

      12288:4OVVI1L5HZtXTkHKwbpJ+WGGzXBXhfTK7eNNTDrFi6gikR:4wqLXt6zpGGNXsivQP

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks