General

  • Target

    BANK_RECEIPT_PDF.exe

  • Size

    209KB

  • Sample

    200630-jp1j4gc2s2

  • MD5

    13b9d3990d60a56c5659e1bfb63a87c5

  • SHA1

    66eaefe211b835712145edd82fea6fceeac4f31e

  • SHA256

    d99e015f0b74d50841cb3122a2c84d2ba549667e3018d571d1383fe4ec49ae69

  • SHA512

    3742ebd3b9f005b465bf1f44218707e3fadf9fc8574727ba57258688c01c426982149fc9c6334e94b6364adbaf525eb181768fcf4fbd11dea248894b1556586c

Malware Config

Extracted

Family

lokibot

C2

http://beckhoff-th.com/kon/kon1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      BANK_RECEIPT_PDF.exe

    • Size

      209KB

    • MD5

      13b9d3990d60a56c5659e1bfb63a87c5

    • SHA1

      66eaefe211b835712145edd82fea6fceeac4f31e

    • SHA256

      d99e015f0b74d50841cb3122a2c84d2ba549667e3018d571d1383fe4ec49ae69

    • SHA512

      3742ebd3b9f005b465bf1f44218707e3fadf9fc8574727ba57258688c01c426982149fc9c6334e94b6364adbaf525eb181768fcf4fbd11dea248894b1556586c

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks