General

  • Target

    c046027428e0fb93ae035e318138a2f8d6b5830bc81d825e2f0e8d72e827660c.exe

  • Size

    96KB

  • Sample

    241209-jdfqxa1jcy

  • MD5

    d7ede461fd6438cfae2cba59fa1e07e9

  • SHA1

    b6f2dbb0d2ae969583a96b8463ccc561324c7b27

  • SHA256

    c046027428e0fb93ae035e318138a2f8d6b5830bc81d825e2f0e8d72e827660c

  • SHA512

    3dd06de3fbd5f2e76ec458b4cb3045f265888b8fcfb99451ad6ec960dc1e592b79393f580dbc2ca4e0cda3d867925949b63815cb9553e143a45d5d28c024a431

  • SSDEEP

    1536:6zvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqnIzmd:hSHIG6mQwGmfOQd8YhY0/EKUG

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.41/simple/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c046027428e0fb93ae035e318138a2f8d6b5830bc81d825e2f0e8d72e827660c.exe

    • Size

      96KB

    • MD5

      d7ede461fd6438cfae2cba59fa1e07e9

    • SHA1

      b6f2dbb0d2ae969583a96b8463ccc561324c7b27

    • SHA256

      c046027428e0fb93ae035e318138a2f8d6b5830bc81d825e2f0e8d72e827660c

    • SHA512

      3dd06de3fbd5f2e76ec458b4cb3045f265888b8fcfb99451ad6ec960dc1e592b79393f580dbc2ca4e0cda3d867925949b63815cb9553e143a45d5d28c024a431

    • SSDEEP

      1536:6zvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqnIzmd:hSHIG6mQwGmfOQd8YhY0/EKUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks