General

  • Target

    6027D63B16F15854873D12F6AE812D18

  • Size

    649KB

  • Sample

    250204-kq4h6s1qew

  • MD5

    6027d63b16f15854873d12f6ae812d18

  • SHA1

    02ca55a43508d715b94bdfa3816bb147c7fd731e

  • SHA256

    c3731e11a6219c6f5ba9ca3bb01e56ef9d64bd629fac34e51b593b661f013d26

  • SHA512

    27f4b1f72ca4f055e32298b63454d09f4ba1eedb7e66359923316f7220b010176fb324e81134287d75c692bd03b0a44fd3933af5d93383a7b592cd6b5ee90943

  • SSDEEP

    12288:VCZhINxw+xgC0aTyX6cfHhdwWHBFuFaPYlFqYms8O5J3AiGSe2SsdwU:EZhINu+xgxZDhFUeY3zms8OzAvBtsdn

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/biggy/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Doc_Copy04762947.exe

    • Size

      732KB

    • MD5

      aa76f2a8b88e2a86f238f4975f1f048d

    • SHA1

      9775d73cac2c7168b4f1e4790bb52b77c8b02763

    • SHA256

      ba24ead7f4a9680c1d11cc6da2dc9089956245c771f6fa05b7c7ab9de6f3e543

    • SHA512

      12d3f4ba0a26f8bb92ac4d292a116a1f68c905130b27a69a6182ddb30730446f15e61b0d24834d667e265448d025bcdc6fd5071aa21c2ad1223827e30663f202

    • SSDEEP

      12288:3UJB0Olux0+EoHyjgsfH7dwWbBFoF2PYDbqYsIGK173MEGSeq63JhZ:cjux033D9Fy6YnzsIGK5Md355D

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks