General

  • Target

    ba07cd9c65b14ed73b58436fdbe6a6507d24d350c0f4ffe9feb85ed57bbca28c.exe

  • Size

    1.5MB

  • Sample

    250327-epf4laxsdw

  • MD5

    b04ac09198406e4e37731d9d66ced244

  • SHA1

    28769f8cf86088fb266069b8e66471e73f5a9f17

  • SHA256

    ba07cd9c65b14ed73b58436fdbe6a6507d24d350c0f4ffe9feb85ed57bbca28c

  • SHA512

    96ef656073e2d111ca10f57bb187cd3a8176e44c45776acc9456519d2cfa5ad95a081fca2ec22ffad8311312e3447f762b3da3fdc007aad9bc5feefc197c47d5

  • SSDEEP

    49152:PRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:PRCDHXt3AiYjKPUEqnde9sk/2nim

Malware Config

Extracted

Family

lokibot

C2

http://beesco.net/second/chief3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ba07cd9c65b14ed73b58436fdbe6a6507d24d350c0f4ffe9feb85ed57bbca28c.exe

    • Size

      1.5MB

    • MD5

      b04ac09198406e4e37731d9d66ced244

    • SHA1

      28769f8cf86088fb266069b8e66471e73f5a9f17

    • SHA256

      ba07cd9c65b14ed73b58436fdbe6a6507d24d350c0f4ffe9feb85ed57bbca28c

    • SHA512

      96ef656073e2d111ca10f57bb187cd3a8176e44c45776acc9456519d2cfa5ad95a081fca2ec22ffad8311312e3447f762b3da3fdc007aad9bc5feefc197c47d5

    • SSDEEP

      49152:PRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:PRCDHXt3AiYjKPUEqnde9sk/2nim

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks