General

  • Target

    40a06f63a197fb03ef98a9abd5d32f38.bin

  • Size

    505KB

  • Sample

    240910-bg639szbjr

  • MD5

    c358508af93b3aaeff97b1d95bb64a90

  • SHA1

    4d1b5aee3ebbf8eb7223d81d633be7ac9a7f3baf

  • SHA256

    c18061c2bf6ae7f8f02433f7b3e3eee0dd3b20f1271b2f68070a186083655b11

  • SHA512

    1bd5e87922d77d3b3887cddadf6b3d9bb6f19fa90f9883a2ebb2d784ce670d5c52c1bec9775176515cc32ab071b115e8742b1bf639da9a4e69ecba235cfec4d7

  • SSDEEP

    12288:n1uewsHffheKX2YP/52qZfWIl2jjzUPI+uCqNPxIKq3juSEYVn2k9TW:n19cKT32D+ZSnszEYdTy

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/pages?id=281164463123697

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      bff8cb2aefafe7c6ed5de903bdd1aa0f9cdb6514085ea82f982747ce9e7d6129.exe

    • Size

      582KB

    • MD5

      40a06f63a197fb03ef98a9abd5d32f38

    • SHA1

      5c0d43b5f956715fa9e7b9277fe0268add2189f3

    • SHA256

      bff8cb2aefafe7c6ed5de903bdd1aa0f9cdb6514085ea82f982747ce9e7d6129

    • SHA512

      07c7c2c950594a512f1a10f5a1309ffd6ff85f785fb3d095931835660631127d0a1d90e49818fa296353c331377f134de518c963392df76dac96d362ad674e95

    • SSDEEP

      12288:YpXRssSHKjOYw9ukiZ7F5mFLgdKhEAm58Q0qbkR:YpBssSq6tuk62Bg288QO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks