General

  • Target

    cb28993cea8ec14a58ded15784eae733f6123d9c8bb9e10a39b13a311753a0b9.zip

  • Size

    284KB

  • Sample

    250327-jnss8ayyav

  • MD5

    a64b48302c50c0b1383668a16e193f33

  • SHA1

    864ab3618c67753b0c76faadc4ae86628f89ee10

  • SHA256

    cb28993cea8ec14a58ded15784eae733f6123d9c8bb9e10a39b13a311753a0b9

  • SHA512

    08902c5f4bd789bd23baa81aec408d19641e9942bd946a4af50319427f06c29ee453f15d57ff68fe8d0e1e1b810ca320e280d96d1a370692dcdb6dcbbd059ea2

  • SSDEEP

    6144:uXc+BhRWXRcDGyO/+dFtU5GymnWMfG4wnVkzpkh:uXrBjWhcDXmmnd9kVp

Malware Config

Extracted

Family

lokibot

C2

http://136.243.159.53/~element/page.php?id=172

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      97d4b97ab4f5880766783a88742969d0995cc86463e05a920486f390139667bc.exe

    • Size

      399KB

    • MD5

      3eb855cf3d2aad29074cca7aabc54180

    • SHA1

      0e9e7b3bdb690d391b941520b9acb3fe20008368

    • SHA256

      97d4b97ab4f5880766783a88742969d0995cc86463e05a920486f390139667bc

    • SHA512

      418a215dcf3d8a0c58207f686334836aff91862fa6ebd6d39e021abdb49f58d42d11c2b49bd4a51bb5393b7012b508c00f73420aa823efe5ab18ed3ce0ab5c67

    • SSDEEP

      6144:7P40bCry6Tnh3Q+3HwOcc0WM2Y7zXNcOUqdWL7CDgrClaG9PYVoPWiN:Tugocc0WMp7rNcNqdWL7CD+ClaG9Pwu

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks