General

  • Target

    a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c.exe

  • Size

    1.1MB

  • Sample

    250318-hrqycszly9

  • MD5

    d5cf93a33671da1bc59838ec0e0cc3a0

  • SHA1

    11ac6fdd8813552b00150c7611755fd04b6456c3

  • SHA256

    a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c

  • SHA512

    162b1d5a9557f0c064dc33fbb3c769ce9a44d873d2e6a68d55474ce908a3eca7fc4e276207dec72c986d9cf0c214876172f28fdec261bf5b17ae621be37e27d0

  • SSDEEP

    24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8aLF/IcUuJ94fdFc:oTvC/MTQYxsWR7aLFRUuiF

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/c3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c.exe

    • Size

      1.1MB

    • MD5

      d5cf93a33671da1bc59838ec0e0cc3a0

    • SHA1

      11ac6fdd8813552b00150c7611755fd04b6456c3

    • SHA256

      a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c

    • SHA512

      162b1d5a9557f0c064dc33fbb3c769ce9a44d873d2e6a68d55474ce908a3eca7fc4e276207dec72c986d9cf0c214876172f28fdec261bf5b17ae621be37e27d0

    • SSDEEP

      24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8aLF/IcUuJ94fdFc:oTvC/MTQYxsWR7aLFRUuiF

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks