General

  • Target

    4184c85c39e0309f6e841530b9b08a2a.exe

  • Size

    555KB

  • Sample

    241030-hfr2aaxjcy

  • MD5

    4184c85c39e0309f6e841530b9b08a2a

  • SHA1

    44034fffb3079ede732ccb37af9a737637c90ac6

  • SHA256

    08591ed45402ad065bab1aaf06a05a2d7c9264695b00299f5059ebaf26584a59

  • SHA512

    28015d2212af15084a664535a1783d0f26c249a4e465bd338ee64b7e9ea822effc9629a941c500ac16052ddb1d1b92ae658e1f8375d1df9319ba4ce2c3c85cc5

  • SSDEEP

    12288:ZfaDPw1Qk89TmyP0KKWIogkr9ck/q84fJqMxMTYRb6W7Ly8Sunx3M8AgjEJWy:ZSLw9gTFP3gm99/v4BqyGW7S2Gt

Malware Config

Extracted

Family

lokibot

C2

http://touxzw.ir/alpha2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4184c85c39e0309f6e841530b9b08a2a.exe

    • Size

      555KB

    • MD5

      4184c85c39e0309f6e841530b9b08a2a

    • SHA1

      44034fffb3079ede732ccb37af9a737637c90ac6

    • SHA256

      08591ed45402ad065bab1aaf06a05a2d7c9264695b00299f5059ebaf26584a59

    • SHA512

      28015d2212af15084a664535a1783d0f26c249a4e465bd338ee64b7e9ea822effc9629a941c500ac16052ddb1d1b92ae658e1f8375d1df9319ba4ce2c3c85cc5

    • SSDEEP

      12288:ZfaDPw1Qk89TmyP0KKWIogkr9ck/q84fJqMxMTYRb6W7Ly8Sunx3M8AgjEJWy:ZSLw9gTFP3gm99/v4BqyGW7S2Gt

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks