General

  • Target

    44G2L_file.exe

  • Size

    506KB

  • Sample

    241209-tzt6jatmht

  • MD5

    1b69820e325f4f2218e96b7e3febe38e

  • SHA1

    e48ba0cd72da1802f2c01f24839f2df2f83b4a57

  • SHA256

    be789d9c5185f7f04ddb78f2b39f9dd7415080c4d975139fc612158b0b3a5bad

  • SHA512

    7308e6bd9fb0499c0caac66339bdccb058750048efdc6b6263216739ca31f5c01d3277e4b1a4c51d17a429ad1a96543189f22df458d9c9bb9d35a2c6109e128b

  • SSDEEP

    12288:FOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiuHR1ABUMl1W8:Fq5TfcdHj4fmbiBUGs8

Malware Config

Extracted

Family

lokibot

C2

http://87.120.113.235/18/pin.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      44G2L_file.exe

    • Size

      506KB

    • MD5

      1b69820e325f4f2218e96b7e3febe38e

    • SHA1

      e48ba0cd72da1802f2c01f24839f2df2f83b4a57

    • SHA256

      be789d9c5185f7f04ddb78f2b39f9dd7415080c4d975139fc612158b0b3a5bad

    • SHA512

      7308e6bd9fb0499c0caac66339bdccb058750048efdc6b6263216739ca31f5c01d3277e4b1a4c51d17a429ad1a96543189f22df458d9c9bb9d35a2c6109e128b

    • SSDEEP

      12288:FOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiuHR1ABUMl1W8:Fq5TfcdHj4fmbiBUGs8

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks