General

  • Target

    0b0389e4c1f10939013c69cd3b7acd17651bcc79eee2bbc1d3ab999f4428df91.gz

  • Size

    491KB

  • Sample

    240917-bdjtkayemj

  • MD5

    c806d39c4e6bc7f8c64109be99f07c01

  • SHA1

    a37490619c9205ae0ea37a13d679c0440b5fec5b

  • SHA256

    0b0389e4c1f10939013c69cd3b7acd17651bcc79eee2bbc1d3ab999f4428df91

  • SHA512

    405753070d562589b678e150b1e82673c5c511fc8e2b168375b15edf24d0834cdadbd8e46b3afea3e4b104e4b694b2636ed565293ab8590bfaab13428b689e21

  • SSDEEP

    12288:XRxRUbGRyUXUXa+t2S8lVRfKGeEqrTdJwkizE2E5b:hxRXrXUq+j8PRNNtET5b

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/pages?id=281164463123697

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DHL Shipment DOC_643040277.exe

    • Size

      650KB

    • MD5

      0eebf2973fe171b460162f942300a434

    • SHA1

      79c230385060a3c4cc5d7723746108690eaad77d

    • SHA256

      1eb1ecc1ff01e9f4934a79daa57db69c96f975b90d649429417c560c1d36bab1

    • SHA512

      290564ab611a05d2922e092c1878f452d825373b0ed35b0ee1f441fe5d53fbc19306117a31e33911d39acc698b233148833cac7ffd96999eacf6dac7a0aeabbb

    • SSDEEP

      12288:DeG1XxgbfyRy4pDm9a+lOy8/fRfCGOiqzt91qJZ4dA1Y8kR:DeG73pT+f8HRFo1qJZ4dGYL

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks