General

  • Target

    a07e0d590556c445729aed78b74913c83e4ccf5080fbead8cf2aded8fd166e5b

  • Size

    313KB

  • Sample

    240903-q3ch4szbme

  • MD5

    e3cd05c470abe18ecfc77b93c49220b8

  • SHA1

    9f37a4a49424d21fd56d3638b16dba2c241e06d7

  • SHA256

    a07e0d590556c445729aed78b74913c83e4ccf5080fbead8cf2aded8fd166e5b

  • SHA512

    5e54271782f4c0af30b445897a38a14b35cc08462944b87649b72354b95e5411e1c6db4eb59df5a3d3d368c752600573c0fc10082811fe9f5cd6e70fdb7bd4d8

  • SSDEEP

    6144:OhjpHgxz03pf8MyB53mXMhAPVIOven5B1HP0laB6OyvZ76XgrEigk++qgKm0fG4h:OOtwMaegene8V676wwBkTt0+4h

Malware Config

Extracted

Family

lokibot

C2

http://checkvim.com/ga12/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e6dd5a2bbbaec7c7cc5d6c68070ceacacd7d364806bbe31dd365cf161a61d3c0

    • Size

      376KB

    • MD5

      ef6feee9c72a7d0ed5e065631faf3b36

    • SHA1

      7be1eb3872891aab4d513ff6725da77609b8e95b

    • SHA256

      e6dd5a2bbbaec7c7cc5d6c68070ceacacd7d364806bbe31dd365cf161a61d3c0

    • SHA512

      c01c707c4b46b5b4fad41ff9af09448a671c8540f9879e750af46c22cd10ee1e3356cb855b19153048ee836467c8484239f0eadf463cd758255920e318da3d8a

    • SSDEEP

      6144:q1nIWAkzEm1owGNmxNslavrY3bi948ipyZRr6EgS4DbXhiTaF9dCJL9mERt9RGTM:6IWAkTGNmxNkMY0iAR2TvDyL9pD3

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks