General

  • Target

    55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b.exe

  • Size

    433KB

  • Sample

    241121-zka21axnax

  • MD5

    a7ed6cdb35af2a1afb12b659f8daf975

  • SHA1

    79ff1a831996a41f63cd4fbd20b09472b4b596c5

  • SHA256

    55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b

  • SHA512

    9a54a1a4db5be77eee39c1e5fd43696631c97256624ffe1c8a2a497acd6105906eef09812dfa72cd26419cbf81357b3476f31a8bab34c7292fdbdbb67b130ff8

  • SSDEEP

    6144:qGxhL+IB/vGCLP4R01wE2WgQdpfa9wLrI3RHOo/+I:j5ZfTw05HVwaqEoGI

Malware Config

Extracted

Family

lokibot

C2

http://37.0.10.225/greg/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b.exe

    • Size

      433KB

    • MD5

      a7ed6cdb35af2a1afb12b659f8daf975

    • SHA1

      79ff1a831996a41f63cd4fbd20b09472b4b596c5

    • SHA256

      55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b

    • SHA512

      9a54a1a4db5be77eee39c1e5fd43696631c97256624ffe1c8a2a497acd6105906eef09812dfa72cd26419cbf81357b3476f31a8bab34c7292fdbdbb67b130ff8

    • SSDEEP

      6144:qGxhL+IB/vGCLP4R01wE2WgQdpfa9wLrI3RHOo/+I:j5ZfTw05HVwaqEoGI

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks