General

  • Target

    file.exe

  • Size

    704KB

  • Sample

    250326-qbq77axly5

  • MD5

    a0e1a3e40489c7f1f73964a679cbe862

  • SHA1

    9e629c75ad614f703239dce280550bacfd37999f

  • SHA256

    b2b9b4ee2a4edc1926c1bfdfa07061968a2e8f3685f5cae15bfbe4723f9156c9

  • SHA512

    f1be03672347150930467964711b696536a52f4e078853ba8fc228ebbd005f1312d9828772cac758ac18c109a5f915e677341510610feec99e95197441ec3f52

  • SSDEEP

    12288:OdwECI8PMa2EZOMJTq94UBRJlIVWxDK7jDav3/gaNHoZz:O9UPMa2rCClIM2CIg

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.41/alpha/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      file.exe

    • Size

      704KB

    • MD5

      a0e1a3e40489c7f1f73964a679cbe862

    • SHA1

      9e629c75ad614f703239dce280550bacfd37999f

    • SHA256

      b2b9b4ee2a4edc1926c1bfdfa07061968a2e8f3685f5cae15bfbe4723f9156c9

    • SHA512

      f1be03672347150930467964711b696536a52f4e078853ba8fc228ebbd005f1312d9828772cac758ac18c109a5f915e677341510610feec99e95197441ec3f52

    • SSDEEP

      12288:OdwECI8PMa2EZOMJTq94UBRJlIVWxDK7jDav3/gaNHoZz:O9UPMa2rCClIM2CIg

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks