General

  • Target

    9ba152900114f325619e857085923ca5f1dbc90da7075dca33aa42df44f3b41b.exe

  • Size

    372KB

  • Sample

    241124-ky21baypfm

  • MD5

    4a27e9720a100554eed197281aa723c5

  • SHA1

    13058b187603070497216978cbc5afa49b1c7782

  • SHA256

    9ba152900114f325619e857085923ca5f1dbc90da7075dca33aa42df44f3b41b

  • SHA512

    159c17f539624e0316995f6d8eb9f7d9a29c6e2deddacd97ec5545bc02ab9d82e5f880457320889026bc12629da13b3f4d0d7436e5ac8143a9f49f2cb0ad897c

  • SSDEEP

    6144:36Uqd2GhNEDnLwOYw8fVZjJ/i05YrVr9cJKmi+KwPLMjXX8te2FQ1067D:KUi2iNEDnLwOYwYbjdi05aJIa+KUA8AP

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/fd4/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9ba152900114f325619e857085923ca5f1dbc90da7075dca33aa42df44f3b41b.exe

    • Size

      372KB

    • MD5

      4a27e9720a100554eed197281aa723c5

    • SHA1

      13058b187603070497216978cbc5afa49b1c7782

    • SHA256

      9ba152900114f325619e857085923ca5f1dbc90da7075dca33aa42df44f3b41b

    • SHA512

      159c17f539624e0316995f6d8eb9f7d9a29c6e2deddacd97ec5545bc02ab9d82e5f880457320889026bc12629da13b3f4d0d7436e5ac8143a9f49f2cb0ad897c

    • SSDEEP

      6144:36Uqd2GhNEDnLwOYw8fVZjJ/i05YrVr9cJKmi+KwPLMjXX8te2FQ1067D:KUi2iNEDnLwOYwYbjdi05aJIa+KUA8AP

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks