General

  • Target

    48d5aff65f2a15098a2c5f6496547eee82cdbd77e1929f5d78652915b374e8f9

  • Size

    307KB

  • Sample

    240830-zr243avgjb

  • MD5

    b909f24029c9192ffbde63593f24398d

  • SHA1

    fc14f2caccbb119f3ef94d48a658cde273c46b83

  • SHA256

    48d5aff65f2a15098a2c5f6496547eee82cdbd77e1929f5d78652915b374e8f9

  • SHA512

    66d5e7b5cf714db2cf70abca09276e26bcc4b65e8b95f7c7c7163d71da0aabaee6cee5f13bde573f5d0fce09c827e202437c3628e02d9a58bdedd469adff9672

  • SSDEEP

    6144:jffZD31L7nweBs3DeRdnHJFBlARKe5KmOxlbLTH6C5lu6Q9J9HANzTm1:jffV1L7weBAezHJF3AKmOxx+CPQ9HHA2

Malware Config

Extracted

Family

lokibot

C2

http://bobbyelectronics.xyz/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      08534277cbfb86840d5250f0a0672ac1fa61a3173cdbccaa2f14e0b9707527aa

    • Size

      369KB

    • MD5

      03c4801d0dc21f4d6f0ba7df857844f9

    • SHA1

      1f45ccc862fd96d7f205f0ce8860535768e20a70

    • SHA256

      08534277cbfb86840d5250f0a0672ac1fa61a3173cdbccaa2f14e0b9707527aa

    • SHA512

      fd5016c0b1a5cd0c58a0a6fa060aaed4808499280075ade2dc8de4c53ecd3c2aeb92bc51a58b7679bd33e0ef8c9eef72b86f0551644fad579b02062806b7ff9c

    • SSDEEP

      6144:Q6Uqd2GhNNK9bCUB3/bKltyu5/uHFL17unUoJBltTXL:xUi2iNE9bCUBvbOtyu5/uTPoJZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks