General

  • Target

    561337232345AWB_PDF.exe

  • Size

    596KB

  • Sample

    200630-jzl3q5ftre

  • MD5

    34b1a75d1a496a56dab2ac024aea2697

  • SHA1

    bc216bf16c14cd0ce75dca42935552309b6d0c87

  • SHA256

    3f5168e76777ef6600eb23dd51d8b0daf33b46fb4d1767094dd0e09ed386540a

  • SHA512

    6efcfe71782004f1f960f0d8165c695fa80193da18d7ec911af2fd23b87b45c7cec980efbd893af862481f36df1ff567b08c9f4205d82b2675441770b6758ff8

Malware Config

Extracted

Family

lokibot

C2

https://airmanselectiontest.com/data/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      561337232345AWB_PDF.exe

    • Size

      596KB

    • MD5

      34b1a75d1a496a56dab2ac024aea2697

    • SHA1

      bc216bf16c14cd0ce75dca42935552309b6d0c87

    • SHA256

      3f5168e76777ef6600eb23dd51d8b0daf33b46fb4d1767094dd0e09ed386540a

    • SHA512

      6efcfe71782004f1f960f0d8165c695fa80193da18d7ec911af2fd23b87b45c7cec980efbd893af862481f36df1ff567b08c9f4205d82b2675441770b6758ff8

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks