General

  • Target

    a2144d07ea3c3844c4a960ec6d90f19b3e3e48f1b722bc4684c3626b47b7c36dN.exe

  • Size

    104KB

  • Sample

    241201-by4pgaslby

  • MD5

    2b4514bde0db94a7c117b3b1f5cc2f30

  • SHA1

    b597ba6651909d888cdd95fc6df0aea4087a6f03

  • SHA256

    a2144d07ea3c3844c4a960ec6d90f19b3e3e48f1b722bc4684c3626b47b7c36d

  • SHA512

    09965d42cda5d656bad9ded6507a6236d05d87dff676a9fde5eb06c0666d545b83d38b8e774b00e18bc0fa0b11473e9b0dbf20c2931aff54dc58bf82f8d72161

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmdD:nSHIG6mQwGmfOQd8YhY0/EqUGD

Malware Config

Extracted

Family

lokibot

C2

http://iykl.xyz/Aridon/w2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a2144d07ea3c3844c4a960ec6d90f19b3e3e48f1b722bc4684c3626b47b7c36dN.exe

    • Size

      104KB

    • MD5

      2b4514bde0db94a7c117b3b1f5cc2f30

    • SHA1

      b597ba6651909d888cdd95fc6df0aea4087a6f03

    • SHA256

      a2144d07ea3c3844c4a960ec6d90f19b3e3e48f1b722bc4684c3626b47b7c36d

    • SHA512

      09965d42cda5d656bad9ded6507a6236d05d87dff676a9fde5eb06c0666d545b83d38b8e774b00e18bc0fa0b11473e9b0dbf20c2931aff54dc58bf82f8d72161

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmdD:nSHIG6mQwGmfOQd8YhY0/EqUGD

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks