General

  • Target

    C27BF6DB51F64901BA56CF64003CABD2.exe

  • Size

    733KB

  • Sample

    241208-jrfm3axpbz

  • MD5

    c27bf6db51f64901ba56cf64003cabd2

  • SHA1

    005e61ccfa9a0840d788bcff2a95cff7ec88d6db

  • SHA256

    3439eaffe1dfd634b46a29ee7f0e938b5b05f9c784123a70b94f9f46aa370381

  • SHA512

    1b3b19272c1d0ae7be07b4be04fbcc58e46b9fedeb31a4292bd3e8a270a2deee22efdd9891a26e708ac5d987b6996cefdac64665a685f52cbfcd54e66eb1d443

  • SSDEEP

    12288:WcrNS33L10QdrX2mVnCGoe0cZKqMEF0JCEharfH0uceMTLlW44UdLZeZ:FNA3R5drXbVCGoRcZDMEwC9UucrjLc

Malware Config

Extracted

Family

lokibot

C2

https://www.stipamana.com/dftjedrshyyj/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      C27BF6DB51F64901BA56CF64003CABD2.exe

    • Size

      733KB

    • MD5

      c27bf6db51f64901ba56cf64003cabd2

    • SHA1

      005e61ccfa9a0840d788bcff2a95cff7ec88d6db

    • SHA256

      3439eaffe1dfd634b46a29ee7f0e938b5b05f9c784123a70b94f9f46aa370381

    • SHA512

      1b3b19272c1d0ae7be07b4be04fbcc58e46b9fedeb31a4292bd3e8a270a2deee22efdd9891a26e708ac5d987b6996cefdac64665a685f52cbfcd54e66eb1d443

    • SSDEEP

      12288:WcrNS33L10QdrX2mVnCGoe0cZKqMEF0JCEharfH0uceMTLlW44UdLZeZ:FNA3R5drXbVCGoRcZDMEwC9UucrjLc

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks