General

  • Target

    FVR-N2411-07396.exe

  • Size

    587KB

  • Sample

    241128-p9s9rsyjhv

  • MD5

    2f402635e17b4f0d9c0d6922d384936a

  • SHA1

    2753a159f2cf160733b1ceeede1db57d2dde0375

  • SHA256

    bfd4e29505627b76243c4ea34c07b22af7edc00391b112e78c2dc3cf7a48d742

  • SHA512

    96ec3a719566a081b060ed3812f5411e637b7f3ea5e3306effbe44d8284016e153182109b4f3c035aa31e8cc350c472fcfb59f5579006b14e0797040b2aa5a44

  • SSDEEP

    12288:ho1zGksv+SGjpA3yKUUo6acZi1bRKrweUbLtBHCMcqH6U6PWuv04MadSEpl:C1zGUxjD1bRK3VMcqH6UqMUHpl

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.41/soja/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      FVR-N2411-07396.exe

    • Size

      587KB

    • MD5

      2f402635e17b4f0d9c0d6922d384936a

    • SHA1

      2753a159f2cf160733b1ceeede1db57d2dde0375

    • SHA256

      bfd4e29505627b76243c4ea34c07b22af7edc00391b112e78c2dc3cf7a48d742

    • SHA512

      96ec3a719566a081b060ed3812f5411e637b7f3ea5e3306effbe44d8284016e153182109b4f3c035aa31e8cc350c472fcfb59f5579006b14e0797040b2aa5a44

    • SSDEEP

      12288:ho1zGksv+SGjpA3yKUUo6acZi1bRKrweUbLtBHCMcqH6U6PWuv04MadSEpl:C1zGUxjD1bRK3VMcqH6UqMUHpl

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks