General

  • Target

    fc4aad9d40fd128f669c23fd3cc95c05fda7b97b47192504aa3773fa112bb3c8

  • Size

    501KB

  • Sample

    241128-th1a8asmby

  • MD5

    9f31734d6418e5a2fec7dbe601032173

  • SHA1

    8e69a2865e54d7fa567829e848f3bc0d3a68eff7

  • SHA256

    fc4aad9d40fd128f669c23fd3cc95c05fda7b97b47192504aa3773fa112bb3c8

  • SHA512

    2e383e2a2c04c79fbddbbdceb9a8d08b2d10d59178dad1c15565b5b745f3ec84fdcd7e6807335c2a8f67a17086a460411239c03050dae4309108074482fe3df8

  • SSDEEP

    12288:DjUtszs7cjujxPCGqfRCC2nkRaTA4QE9X1IXnV7bR:HVmfx9TkaTnRRW5bR

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.41/davinci/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Proforma Invoice.exe

    • Size

      526KB

    • MD5

      8a837ff22ac4b29071a8bb9a1990b2e1

    • SHA1

      13325e7f017dbece8799c6a474c2b5c7869fce07

    • SHA256

      6cca6d4fdb09556a47e58c002e227f93281ca6f7f553acd054e6ced27a124fad

    • SHA512

      effa316f2428f9410e12f27f34d47fedcb807c12f86eee2f1e6ddf6f09a29765aecadca7488b2db33b70683e0cb2961134b7dbc3dccd82b50f1d5aa8cd3b20a3

    • SSDEEP

      12288:+Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiv27j8JnB1a:+q5TfcdHj4fmbbMra

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks