General

  • Target

    9d32a97b954b074de123f9f94cd1b03b0dadbead3a41d5d6e3d2b0c8ffa2cc80.exe

  • Size

    395KB

  • Sample

    241122-kkbwzaxnfx

  • MD5

    459889492fb27d5ff2cb05274e925fc9

  • SHA1

    bcafd9abdcb62393f41df8eca4a9359f2e162b63

  • SHA256

    9d32a97b954b074de123f9f94cd1b03b0dadbead3a41d5d6e3d2b0c8ffa2cc80

  • SHA512

    ce9c219be0df54aa2d9c1c34be9cb1d4b3e537a8e22385a7dd62ec3a17fdd4fa505c4ac881205679bf37af791ca86fc28e2dc7986dd90d87215579ae72def4d5

  • SSDEEP

    6144:hsonJH5wognja6Uqd2GhNBSgDh0kBE7woo3eDYCFwdjLvgSHKAm9z:PHgjUi2iNtDuk67ZPDfFwdLvhMz

Malware Config

Extracted

Family

lokibot

C2

http://63.250.40.204/~wpdemo/file.php?search=835338

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9d32a97b954b074de123f9f94cd1b03b0dadbead3a41d5d6e3d2b0c8ffa2cc80.exe

    • Size

      395KB

    • MD5

      459889492fb27d5ff2cb05274e925fc9

    • SHA1

      bcafd9abdcb62393f41df8eca4a9359f2e162b63

    • SHA256

      9d32a97b954b074de123f9f94cd1b03b0dadbead3a41d5d6e3d2b0c8ffa2cc80

    • SHA512

      ce9c219be0df54aa2d9c1c34be9cb1d4b3e537a8e22385a7dd62ec3a17fdd4fa505c4ac881205679bf37af791ca86fc28e2dc7986dd90d87215579ae72def4d5

    • SSDEEP

      6144:hsonJH5wognja6Uqd2GhNBSgDh0kBE7woo3eDYCFwdjLvgSHKAm9z:PHgjUi2iNtDuk67ZPDfFwdLvhMz

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks