General

  • Target

    8a76574c9702b7c064ddb4f22f85d5795012189339bdeaf42151dedd300033dcN.exe

  • Size

    496KB

  • Sample

    250204-zs9kjaskcw

  • MD5

    02ede2996d8518134c22849870ed8c50

  • SHA1

    357b7d88838da944358695fd39cbe3632ec00ff3

  • SHA256

    8a76574c9702b7c064ddb4f22f85d5795012189339bdeaf42151dedd300033dc

  • SHA512

    549bfe6208d0cec5b5d92de0238b23b0751cc85f7d4c86e8327d0ec2b730da8d74cc50db17427f786550289f09f94f757a8df3f1ba43a2a7baca894f2b2982b0

  • SSDEEP

    12288:w3vNGY2Ow4Fuya1ghBEbbwjT10DdiB7Sgi1XyIu:YcSw+UgXYbC1Oda7Sn

Malware Config

Extracted

Family

lokibot

C2

http://198.187.30.47/p.php?id=21645050038542306

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8a76574c9702b7c064ddb4f22f85d5795012189339bdeaf42151dedd300033dcN.exe

    • Size

      496KB

    • MD5

      02ede2996d8518134c22849870ed8c50

    • SHA1

      357b7d88838da944358695fd39cbe3632ec00ff3

    • SHA256

      8a76574c9702b7c064ddb4f22f85d5795012189339bdeaf42151dedd300033dc

    • SHA512

      549bfe6208d0cec5b5d92de0238b23b0751cc85f7d4c86e8327d0ec2b730da8d74cc50db17427f786550289f09f94f757a8df3f1ba43a2a7baca894f2b2982b0

    • SSDEEP

      12288:w3vNGY2Ow4Fuya1ghBEbbwjT10DdiB7Sgi1XyIu:YcSw+UgXYbC1Oda7Sn

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks