General

  • Target

    f1f5ca357c3c67ee391971f3dee3136ca140f5d0e905237837427d4bd287e797.xls

  • Size

    62KB

  • Sample

    250128-h4hshs1nhw

  • MD5

    634eda2ed35505b3af4dcc9fd537a009

  • SHA1

    0d78d766baaf10a9c2be65e058ac26dad61d6e69

  • SHA256

    f1f5ca357c3c67ee391971f3dee3136ca140f5d0e905237837427d4bd287e797

  • SHA512

    3a5697b7b0b4e629a54cd8c46ecfdc2793ad740a296907999e9b7f8a084a6a586d1b4235186da82545e737b08b8688ee4141e580517626eab449d45690d7f6a2

  • SSDEEP

    1536:tnxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAq6/EmoPR+Dz:tnxEtjPOtioVjDGUU1qfDlaGGx+cL2QX

Malware Config

Extracted

Family

lokibot

C2

http://85.31.47.84:5336/adsafref/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f1f5ca357c3c67ee391971f3dee3136ca140f5d0e905237837427d4bd287e797.xls

    • Size

      62KB

    • MD5

      634eda2ed35505b3af4dcc9fd537a009

    • SHA1

      0d78d766baaf10a9c2be65e058ac26dad61d6e69

    • SHA256

      f1f5ca357c3c67ee391971f3dee3136ca140f5d0e905237837427d4bd287e797

    • SHA512

      3a5697b7b0b4e629a54cd8c46ecfdc2793ad740a296907999e9b7f8a084a6a586d1b4235186da82545e737b08b8688ee4141e580517626eab449d45690d7f6a2

    • SSDEEP

      1536:tnxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAq6/EmoPR+Dz:tnxEtjPOtioVjDGUU1qfDlaGGx+cL2QX

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks