General

  • Target

    e70b780a4e98503745b72ba33f45812c75d27d88bbeb5.exe

  • Size

    267KB

  • Sample

    250128-njt8psxkcy

  • MD5

    524d8e883108dec6d7ce2f96fdd8985d

  • SHA1

    931af8ea63d58a25f34e14a9ac8aa80d33949eeb

  • SHA256

    e70b780a4e98503745b72ba33f45812c75d27d88bbeb58ce4feba484c016e14e

  • SHA512

    a1bff8235da4964f571068ce9581e9e12a466ad714729d21d80aac24e29f2e0cc510ddb2f6717ee8a07a0cbd4f8ad646ab25b7f5b409d0badc9b041536c8a595

  • SSDEEP

    6144:zSco+K5NsYIE8MSuEi2jxvoAWjMHmpqj7weFyO8dZf:OlQYIrduEiwoXMsqPwI+f

Malware Config

Extracted

Family

lokibot

C2

http://46.183.222.162/bcxgfhgsf/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e70b780a4e98503745b72ba33f45812c75d27d88bbeb5.exe

    • Size

      267KB

    • MD5

      524d8e883108dec6d7ce2f96fdd8985d

    • SHA1

      931af8ea63d58a25f34e14a9ac8aa80d33949eeb

    • SHA256

      e70b780a4e98503745b72ba33f45812c75d27d88bbeb58ce4feba484c016e14e

    • SHA512

      a1bff8235da4964f571068ce9581e9e12a466ad714729d21d80aac24e29f2e0cc510ddb2f6717ee8a07a0cbd4f8ad646ab25b7f5b409d0badc9b041536c8a595

    • SSDEEP

      6144:zSco+K5NsYIE8MSuEi2jxvoAWjMHmpqj7weFyO8dZf:OlQYIrduEiwoXMsqPwI+f

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks