General

  • Target

    sCIPrhZt5Yub9qL.exe

  • Size

    734KB

  • Sample

    250327-rvs2kavrs6

  • MD5

    ce52f74483c87bf95fb4da1b8332b099

  • SHA1

    e8056182fdf2e504d7aacfc7e4c32b9f4187a604

  • SHA256

    353f0431abc35f4de737193828be509e69003e0ba6e917e60aa5ce6c025d98a0

  • SHA512

    9ab6a81281c92c0d5882c0d7ddb0be9522567c7693a983010b0a3bfdf262ca13cf7e14dc006914e3fbab1b85f87b5f9bfefb3723d83b6f62c099859193e8f843

  • SSDEEP

    12288:rZ9hj3yyzaEPge0YCIP9nESFDBvIHWzYvejnK73mNrpHIJo8BV+6CgqTopi:rZ1ape2IhES9Bvn+ejnKaNrg3+/gqTop

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.41/alpha/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      sCIPrhZt5Yub9qL.exe

    • Size

      734KB

    • MD5

      ce52f74483c87bf95fb4da1b8332b099

    • SHA1

      e8056182fdf2e504d7aacfc7e4c32b9f4187a604

    • SHA256

      353f0431abc35f4de737193828be509e69003e0ba6e917e60aa5ce6c025d98a0

    • SHA512

      9ab6a81281c92c0d5882c0d7ddb0be9522567c7693a983010b0a3bfdf262ca13cf7e14dc006914e3fbab1b85f87b5f9bfefb3723d83b6f62c099859193e8f843

    • SSDEEP

      12288:rZ9hj3yyzaEPge0YCIP9nESFDBvIHWzYvejnK73mNrpHIJo8BV+6CgqTopi:rZ1ape2IhES9Bvn+ejnKaNrg3+/gqTop

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks