General

  • Target

    f73021002ed86b0c0025a8b7384b5e122ae3df8db0b9dd4fa2d85b09f85cf32d.exe

  • Size

    552KB

  • Sample

    241022-cgdbmasejp

  • MD5

    9a5acb8b5e382928e56ac6cadae01bcd

  • SHA1

    91419169fea21c582b12dc7da51a70a076242310

  • SHA256

    f73021002ed86b0c0025a8b7384b5e122ae3df8db0b9dd4fa2d85b09f85cf32d

  • SHA512

    d91924e0e9e8b3ffdd6e7b51fcc46c634c4cfbfd9a33ab5478396111276e5f75c0fd2aac9a5e8c88d8b4fdb0d7313060ddbf4b81331d354ddee785f86e1af4a4

  • SSDEEP

    12288:eikhMOoltiJu+rc4NSGkCYc0LginZfY+Zw3MoTxooNVk8QBH:eikh5oDiJu+rcPQiZg2wccxr6H

Malware Config

Extracted

Family

lokibot

C2

https://dddotx.site/ClarkB/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f73021002ed86b0c0025a8b7384b5e122ae3df8db0b9dd4fa2d85b09f85cf32d.exe

    • Size

      552KB

    • MD5

      9a5acb8b5e382928e56ac6cadae01bcd

    • SHA1

      91419169fea21c582b12dc7da51a70a076242310

    • SHA256

      f73021002ed86b0c0025a8b7384b5e122ae3df8db0b9dd4fa2d85b09f85cf32d

    • SHA512

      d91924e0e9e8b3ffdd6e7b51fcc46c634c4cfbfd9a33ab5478396111276e5f75c0fd2aac9a5e8c88d8b4fdb0d7313060ddbf4b81331d354ddee785f86e1af4a4

    • SSDEEP

      12288:eikhMOoltiJu+rc4NSGkCYc0LginZfY+Zw3MoTxooNVk8QBH:eikh5oDiJu+rcPQiZg2wccxr6H

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks