General

  • Target

    c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52.exe

  • Size

    1.5MB

  • Sample

    250327-f4mqcszmx3

  • MD5

    22cf9f5563030db472874f3bebc28947

  • SHA1

    4f9020bd93da524a31657bf1bcfac7c86d6aa68e

  • SHA256

    c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52

  • SHA512

    72d69d78bd351c04dafb8ba0629131edd14d35bf6e460c1e2de3f343a9ccdd90218ec7c90bbe27feff4a9ea57e6a8054bb006958d6e5e7a697e16a21a8287cdc

  • SSDEEP

    49152:sRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:sRCDHXt3AiYjKPUEqnde9sk/2nim

Malware Config

Extracted

Family

lokibot

C2

http://beesco.net/second/chief3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52.exe

    • Size

      1.5MB

    • MD5

      22cf9f5563030db472874f3bebc28947

    • SHA1

      4f9020bd93da524a31657bf1bcfac7c86d6aa68e

    • SHA256

      c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52

    • SHA512

      72d69d78bd351c04dafb8ba0629131edd14d35bf6e460c1e2de3f343a9ccdd90218ec7c90bbe27feff4a9ea57e6a8054bb006958d6e5e7a697e16a21a8287cdc

    • SSDEEP

      49152:sRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:sRCDHXt3AiYjKPUEqnde9sk/2nim

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks