General

  • Target

    6cc0abc5f4e343708dc4ad0073784da3.exe

  • Size

    305KB

  • Sample

    241210-ztvg1atmgn

  • MD5

    6cc0abc5f4e343708dc4ad0073784da3

  • SHA1

    a2c0274575fb089bb76f34bf0b52e9f84f0c0a3a

  • SHA256

    c049ffcacd139b734c807013fefa36e6730077930d3736f342aaddc3fe144497

  • SHA512

    61703c2283b321f30d47e6e2319d8372abd3d6eb980a27ca08d70946b7053f904d2adbc8c71ea3e36c8e6a29d110939f71289e437d936db757a53819576ca310

  • SSDEEP

    6144:VkbCBC44YUk+XfYQqlUv5uUmLRuXr1/dIU8A8OvCCuwiVj7tjYd:fBCpBGUhuHROr1186vCCuwiVj7tjY

Malware Config

Extracted

Family

lokibot

C2

https://www.stipamana.com/jedrshyyjdft/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6cc0abc5f4e343708dc4ad0073784da3.exe

    • Size

      305KB

    • MD5

      6cc0abc5f4e343708dc4ad0073784da3

    • SHA1

      a2c0274575fb089bb76f34bf0b52e9f84f0c0a3a

    • SHA256

      c049ffcacd139b734c807013fefa36e6730077930d3736f342aaddc3fe144497

    • SHA512

      61703c2283b321f30d47e6e2319d8372abd3d6eb980a27ca08d70946b7053f904d2adbc8c71ea3e36c8e6a29d110939f71289e437d936db757a53819576ca310

    • SSDEEP

      6144:VkbCBC44YUk+XfYQqlUv5uUmLRuXr1/dIU8A8OvCCuwiVj7tjYd:fBCpBGUhuHROr1186vCCuwiVj7tjY

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks