General

  • Target

    ba934973bca1c75b9bc1aa5a24e7f9dda6e65b9edbe2aacf6c763ba7b0f4d79b

  • Size

    481KB

  • Sample

    241120-s8w6taypew

  • MD5

    471785b0e509d7758c27e9af0f5c6ea1

  • SHA1

    ef1ad64e8e472fc687eec6feb70d08c2f4407c9a

  • SHA256

    ba934973bca1c75b9bc1aa5a24e7f9dda6e65b9edbe2aacf6c763ba7b0f4d79b

  • SHA512

    d71f03cf210d00f1953372583ddb02de66e2781ad3f0816c47a50ce3abc2ed800c641cba36033049021321901ba13fa0b7f797bb0f8a4c5ba7c74169b4cfba58

  • SSDEEP

    12288:u92YbpwUSaQz7C0qvRAnoIzQlYAWXozVnpPNlZjW:MlS3SRC+WMPNlZjW

Malware Config

Extracted

Family

lokibot

C2

http://87.120.113.235/18/pin.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      FACTURA09876567000.bat

    • Size

      506KB

    • MD5

      f4a43c4e63d1bc8908819fc2b3b6a83b

    • SHA1

      03f88667ac44a41a2b5e4b2cf48f23302ae79b6c

    • SHA256

      ecc61fe635e2cdb0859441ef90e330230094e7514cf00cb48829e136d713b63b

    • SHA512

      6f1ce342403bc33f5dabfa0260da8f45bfd6d3bdfe72df20e0a617f71bf2abe926a29393d4a9e4621ee8a5ade029c20ed025fe377ab7c1d6f954f866c1efe76f

    • SSDEEP

      12288:FOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPi0Q/mXWb0zjnfxNNZjXO:Fq5TfcdHj4fmbjQOXQ0xNNZjXO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks