General

  • Target

    079f962ef81e19092c633fe2e44d5ebb31eb83c0cb5d1052e1a048e15ba549c8.exe

  • Size

    541KB

  • Sample

    241002-bdr5yashnd

  • MD5

    fc9c0d308e1e66caf355a329f171362a

  • SHA1

    f88d0427a7fab032dcc647f68facf43fcda1857e

  • SHA256

    079f962ef81e19092c633fe2e44d5ebb31eb83c0cb5d1052e1a048e15ba549c8

  • SHA512

    01fcfe9c0a3d90ab703a08609ca2cac512875a12f7eb3f1495451cb2e99bd4d3aa1e2382a36d8e94144bcb83c1fcd8105b1283f202a6c70f258fd2b1b7927c3e

  • SSDEEP

    12288:GLdf+AksR4vnxuBvV50UKzaiIVJWLllyzD7ejNrkko:g8AksengBv0N2kNrkko

Malware Config

Extracted

Family

lokibot

C2

http://solutviewmen.viewdns.net/bdifygidj/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      079f962ef81e19092c633fe2e44d5ebb31eb83c0cb5d1052e1a048e15ba549c8.exe

    • Size

      541KB

    • MD5

      fc9c0d308e1e66caf355a329f171362a

    • SHA1

      f88d0427a7fab032dcc647f68facf43fcda1857e

    • SHA256

      079f962ef81e19092c633fe2e44d5ebb31eb83c0cb5d1052e1a048e15ba549c8

    • SHA512

      01fcfe9c0a3d90ab703a08609ca2cac512875a12f7eb3f1495451cb2e99bd4d3aa1e2382a36d8e94144bcb83c1fcd8105b1283f202a6c70f258fd2b1b7927c3e

    • SSDEEP

      12288:GLdf+AksR4vnxuBvV50UKzaiIVJWLllyzD7ejNrkko:g8AksengBv0N2kNrkko

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks