General

  • Target

    ac0d45ffcb5912a6401c12f2433b57df6aff3635a4c98337b4a2cbfa403713cd

  • Size

    465KB

  • Sample

    250317-d7xzdsyzby

  • MD5

    ec6e4a711941901584dbe499173cd9d4

  • SHA1

    ef0f7493ff61506637beb885f4790593e29b81b9

  • SHA256

    ac0d45ffcb5912a6401c12f2433b57df6aff3635a4c98337b4a2cbfa403713cd

  • SHA512

    630d6b6b0516188b3fe531c32eaeea88d12ad37c9bb9923e7b616b5e195fa05401cdf1aabac3dd0483d4794943a7eb1cc86520a498b04752d24d63965b75ec62

  • SSDEEP

    12288:CXVDk9BrIf4BWJd8bJMkjZSCySwvz7hzUxLgv:CXVDk9pIYaoMkECTwvz7hzEo

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.41/scc2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SAILING SCHEDULE_pdf.bat

    • Size

      526KB

    • MD5

      df6a8ea7ddba625fb871b9e8cae61d20

    • SHA1

      bc6fb1a28184482e6b2a55df74271c6cfa1c6a50

    • SHA256

      c04d5501e6f5d1154e27d0077628c15979926713696ac35beda2b6d8aa4119e5

    • SHA512

      9b2630afceaa2a0561bb8a9e8713b0a264d86d5580a8bb30b75402d9540d62627915af7deeb7de104a7f1f69d97f8981bfc5543e1119a78b7a3b7509c4472dc8

    • SSDEEP

      12288:8PSfRWxZuHr5NSV1RSWZVh4B4HdkbJMSjZSx0/vGv073GNR0u:8Pt/OjSV1RTZV200M6ERv0Z

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks