General

  • Target

    c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2.exe

  • Size

    541KB

  • Sample

    241002-bzz3nsvapa

  • MD5

    2a1f30757144052d5b5fbe99232d6e5a

  • SHA1

    88dd7267c531ff0309d83869b079f378c7e51ef3

  • SHA256

    c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2

  • SHA512

    717e72d516d06a9f837a17262516f2af19ba1f91c1ed4d7212c1328be805b9ed8dc544d7c6caaf34993d48e0400acb8248ca2513860b6f949e07dd049ded2db2

  • SSDEEP

    12288:bfAqPr584x+Mh89sw+ncw50149Sg6oSuJ8nwp4nxC93Nrkkz:MqN86+m8lEx0gSKNrkkz

Malware Config

Extracted

Family

lokibot

C2

http://solutviewmen.viewdns.net/bdifygidj/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2.exe

    • Size

      541KB

    • MD5

      2a1f30757144052d5b5fbe99232d6e5a

    • SHA1

      88dd7267c531ff0309d83869b079f378c7e51ef3

    • SHA256

      c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2

    • SHA512

      717e72d516d06a9f837a17262516f2af19ba1f91c1ed4d7212c1328be805b9ed8dc544d7c6caaf34993d48e0400acb8248ca2513860b6f949e07dd049ded2db2

    • SSDEEP

      12288:bfAqPr584x+Mh89sw+ncw50149Sg6oSuJ8nwp4nxC93Nrkkz:MqN86+m8lEx0gSKNrkkz

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks