General

  • Target

    1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N

  • Size

    450KB

  • Sample

    240919-mpx14stfqe

  • MD5

    638bde27e9224ccd829429fd6d13a8b0

  • SHA1

    4bf857d7bedf137c7bfafb55048732072849ad0c

  • SHA256

    1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32

  • SHA512

    791a88ebce82033ea16ab8e94362e4422e5e6a62b55f1d694b2b11aa214979415d9cc50414c45b4cf1af541de854fb73e4a368b8766743d68b9a37c8ecbb4a96

  • SSDEEP

    6144:EdzkwTata6GOw94Jl/e5I7wjmzCcOeHt6OiwAHT+pATwyElL5DbyGowb1U3V8r61:WPT0m4G5I7wjmn6yHp8wVLBy3US18xSL

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/B0MWbknI2Z7T2

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N

    • Size

      450KB

    • MD5

      638bde27e9224ccd829429fd6d13a8b0

    • SHA1

      4bf857d7bedf137c7bfafb55048732072849ad0c

    • SHA256

      1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32

    • SHA512

      791a88ebce82033ea16ab8e94362e4422e5e6a62b55f1d694b2b11aa214979415d9cc50414c45b4cf1af541de854fb73e4a368b8766743d68b9a37c8ecbb4a96

    • SSDEEP

      6144:EdzkwTata6GOw94Jl/e5I7wjmzCcOeHt6OiwAHT+pATwyElL5DbyGowb1U3V8r61:WPT0m4G5I7wjmn6yHp8wVLBy3US18xSL

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks