General

  • Target

    Trojan.MSIL.SnakeLogger.AZ.MTB-83c416357c377e8f709d0e997a34c2471228a35119a8d8e94557eda8af800b88N

  • Size

    490KB

  • Sample

    240916-jjmreawemj

  • MD5

    22876c5b8a0e895e2f3a8b5a00041de0

  • SHA1

    3cedf9d5b79ba8fa2f36bcd17b523e54c83e74a4

  • SHA256

    83c416357c377e8f709d0e997a34c2471228a35119a8d8e94557eda8af800b88

  • SHA512

    ce2b59b772954b58e765dfae0e51ed77fce4c021dc7a35e312f5310602124a5ca70a1f0089bbe4fb3ea7c59ff718eb548e80c95a0d4646de1a38b433d8e1dc5f

  • SSDEEP

    12288:xA7kvSmXbf/Ztxt0fPKrIn4b7uWY4AHody8NjktpekR:xAoSebXZ50UnRY4AIdy8RspF

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/edit.php?name=1

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Trojan.MSIL.SnakeLogger.AZ.MTB-83c416357c377e8f709d0e997a34c2471228a35119a8d8e94557eda8af800b88N

    • Size

      490KB

    • MD5

      22876c5b8a0e895e2f3a8b5a00041de0

    • SHA1

      3cedf9d5b79ba8fa2f36bcd17b523e54c83e74a4

    • SHA256

      83c416357c377e8f709d0e997a34c2471228a35119a8d8e94557eda8af800b88

    • SHA512

      ce2b59b772954b58e765dfae0e51ed77fce4c021dc7a35e312f5310602124a5ca70a1f0089bbe4fb3ea7c59ff718eb548e80c95a0d4646de1a38b433d8e1dc5f

    • SSDEEP

      12288:xA7kvSmXbf/Ztxt0fPKrIn4b7uWY4AHody8NjktpekR:xAoSebXZ50UnRY4AIdy8RspF

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks