General

  • Target

    ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726.exe

  • Size

    527KB

  • Sample

    250110-rheneaymcm

  • MD5

    de71da3a473f5cdb285d30a1d6dd333b

  • SHA1

    ebb3e9e7fe88c5ba0c24d0411f7a0c04c9e04181

  • SHA256

    ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726

  • SHA512

    56abc310955d04ab212c8737c6b1c2ef744f4c0d623fb7e12f4fcb4c8a5d03b9c80d96f225cc022a6abc09f2ea68700e3ebfba0b281e52a0e71996c06fa62d8d

  • SSDEEP

    12288:gPGqp9ou9WbaMbHkBsy6oaQRCfWksQVJZaoIsfMD:aroIWBrkPXcLXaoZMD

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.41/simple/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726.exe

    • Size

      527KB

    • MD5

      de71da3a473f5cdb285d30a1d6dd333b

    • SHA1

      ebb3e9e7fe88c5ba0c24d0411f7a0c04c9e04181

    • SHA256

      ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726

    • SHA512

      56abc310955d04ab212c8737c6b1c2ef744f4c0d623fb7e12f4fcb4c8a5d03b9c80d96f225cc022a6abc09f2ea68700e3ebfba0b281e52a0e71996c06fa62d8d

    • SSDEEP

      12288:gPGqp9ou9WbaMbHkBsy6oaQRCfWksQVJZaoIsfMD:aroIWBrkPXcLXaoZMD

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks