General

  • Target

    4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417

  • Size

    696KB

  • Sample

    241121-yh6v8azner

  • MD5

    7be7b72ea0f610ca28c46a0583d79089

  • SHA1

    0d52d743184cf08bec3c3e551dc98562a7d4623e

  • SHA256

    4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417

  • SHA512

    c5c02b88f2a644ac6e43a054e7236768e8ad27e116c17db24b8ea450ef8994fcb0ee048fe18394e318de87d0d092a5ea3c5e114ce2f087a2c04f5f62c5a417af

  • SSDEEP

    12288:sLTcphRNzB0WONCWb2gb3IU3P+3DlLNXv3Pwan/ZLP+O+IZVK13O1OcaFlSNS:s8phRNl0NsO9f0DlZXv/wadPGIw38aQS

Malware Config

Extracted

Family

lokibot

C2

http://qtd8gcdoplav737wretjqmaiy.tk/pato/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417

    • Size

      696KB

    • MD5

      7be7b72ea0f610ca28c46a0583d79089

    • SHA1

      0d52d743184cf08bec3c3e551dc98562a7d4623e

    • SHA256

      4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417

    • SHA512

      c5c02b88f2a644ac6e43a054e7236768e8ad27e116c17db24b8ea450ef8994fcb0ee048fe18394e318de87d0d092a5ea3c5e114ce2f087a2c04f5f62c5a417af

    • SSDEEP

      12288:sLTcphRNzB0WONCWb2gb3IU3P+3DlLNXv3Pwan/ZLP+O+IZVK13O1OcaFlSNS:s8phRNl0NsO9f0DlZXv/wadPGIw38aQS

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks