Resubmissions

01-12-2024 17:33

241201-v47svs1rck 10

01-12-2024 17:31

241201-v34d2sxkev 10

General

  • Target

    TU-35.exe

  • Size

    587KB

  • Sample

    241201-v34d2sxkev

  • MD5

    4dea06ea49de777e6458e274d7bd5dae

  • SHA1

    b8fdd204688f4cb3d8819dc904ca018786dd1e72

  • SHA256

    de3a30c0b47d80e830816275d72030c3574b24780398040fafc29f934c06e1c6

  • SHA512

    0912c3a45a338be3460d537a13c1d7bc7d3b97ad46bf8cb66fba2d7e57794be6f68d98afe2979f8ff1f88596ba52f2fd69577e9765dcd971c7ec77cb9a59ee72

  • SSDEEP

    12288:lnCb+eCSmgxNYSm/Rk+DxXeWrVRim7p/1iac+1Zyo:luCuFm99uWRRf7p/sa1Y

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.41/maxzi/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      TU-35.exe

    • Size

      587KB

    • MD5

      4dea06ea49de777e6458e274d7bd5dae

    • SHA1

      b8fdd204688f4cb3d8819dc904ca018786dd1e72

    • SHA256

      de3a30c0b47d80e830816275d72030c3574b24780398040fafc29f934c06e1c6

    • SHA512

      0912c3a45a338be3460d537a13c1d7bc7d3b97ad46bf8cb66fba2d7e57794be6f68d98afe2979f8ff1f88596ba52f2fd69577e9765dcd971c7ec77cb9a59ee72

    • SSDEEP

      12288:lnCb+eCSmgxNYSm/Rk+DxXeWrVRim7p/1iac+1Zyo:luCuFm99uWRRf7p/sa1Y

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks