General

  • Target

    2cd1e2fcd8f7c45fc8bc9a46c232fb71e75dcdb83b61b3b531ec54a847343fc3.zip

  • Size

    233KB

  • Sample

    250325-sk1jbsxzbt

  • MD5

    17c3cdcdbc63442b715c1bfa2f967ac1

  • SHA1

    500c7ba51ef9c61e5741eb994219d26b713e6e50

  • SHA256

    2cd1e2fcd8f7c45fc8bc9a46c232fb71e75dcdb83b61b3b531ec54a847343fc3

  • SHA512

    9e5f81b4029dd9f87f786bdb2d886260513f94545cb3634a4e5eec11a60effcbb6a1c8cfd36bfcd50ec4e6f34a2bb922361cd74f58cc4233417daa0da1ae5bcf

  • SSDEEP

    6144:EYdZHMCk4R6nsbXWjz6oEHoWwXUGRcXEgHJsX2DXUf:ndZHh6nsbGjz7QTQcXEgHimrUf

Malware Config

Extracted

Family

lokibot

C2

http://qreenmaple.com/baba/baba1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      011876543567546_pdf.scr

    • Size

      388KB

    • MD5

      2c00c7674d6c3701c78cf2a4dfb0ce3f

    • SHA1

      853583a9010be8f4403b51ed39c51eecfd5ee2f0

    • SHA256

      b0cf41eaffcc2c22c866c4cb721d763021898f74f1bdf35d4ae2711f6edf327b

    • SHA512

      a45e94221010a9763bcf1e1a1e562597d4f9399e57b65c817b98fd4c3428e9283055f78840e3d81e807135a2ef1fbc8e4ffd0b88fa12985968553a3e82122686

    • SSDEEP

      6144:uLKqZi7AfpBLwZcjbMTVz3ujAOJQ1Phkq66GH2xz3h9ZAEGckcO0Dd:uuYi0XwZK+VzOwD6JHA3nmEBkzsd

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks