General

  • Target

    04f4042f2f96b4c74ec2b336905d469c.exe

  • Size

    1.5MB

  • Sample

    250324-vxdw7swr12

  • MD5

    04f4042f2f96b4c74ec2b336905d469c

  • SHA1

    4b917ef74b8b08c44d83c4dfe8f56a40e72cad32

  • SHA256

    8af2c5cbbd64bc20fc6b292a0dcfe5efa795b1dd5dadd1c5f68933a7a81ae388

  • SHA512

    62dcab3c5c7cf1c698e7c96c6d0603646c7332140fec969d63389cf739a1b4a8abb5ffce311ab89a04287d250e27c48e5354b498ccbcd76db417034ee389fd7a

  • SSDEEP

    49152:uRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh5:uRCDHXt3AiYjKPUEqnde9sk/2nim5

Malware Config

Extracted

Family

lokibot

C2

http://beesco.net/second/chief3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      04f4042f2f96b4c74ec2b336905d469c.exe

    • Size

      1.5MB

    • MD5

      04f4042f2f96b4c74ec2b336905d469c

    • SHA1

      4b917ef74b8b08c44d83c4dfe8f56a40e72cad32

    • SHA256

      8af2c5cbbd64bc20fc6b292a0dcfe5efa795b1dd5dadd1c5f68933a7a81ae388

    • SHA512

      62dcab3c5c7cf1c698e7c96c6d0603646c7332140fec969d63389cf739a1b4a8abb5ffce311ab89a04287d250e27c48e5354b498ccbcd76db417034ee389fd7a

    • SSDEEP

      49152:uRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh5:uRCDHXt3AiYjKPUEqnde9sk/2nim5

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.