General

  • Target

    1b436cf860cb4e1beb66ee4534d41b2f.exe

  • Size

    926KB

  • Sample

    200731-qys19jrvcs

  • MD5

    1b436cf860cb4e1beb66ee4534d41b2f

  • SHA1

    656f8f3c4a9e271bf91098947df89d25730aa9ff

  • SHA256

    b6c1578da26c1c35f1806ae0c80d2cd81817a2e9de0a69e72f0b9dcd3013cc3f

  • SHA512

    114797d1f6d89c56f8228f516804cfd7eadee04b5442f32546b3924280dcdcc96cab9d88ed04e474e7ca1471f4444207a9aba1665dbf84c07cdcaefe4de81749

Malware Config

Extracted

Family

lokibot

C2

http://104.223.143.234/coconut/Panel/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      1b436cf860cb4e1beb66ee4534d41b2f.exe

    • Size

      926KB

    • MD5

      1b436cf860cb4e1beb66ee4534d41b2f

    • SHA1

      656f8f3c4a9e271bf91098947df89d25730aa9ff

    • SHA256

      b6c1578da26c1c35f1806ae0c80d2cd81817a2e9de0a69e72f0b9dcd3013cc3f

    • SHA512

      114797d1f6d89c56f8228f516804cfd7eadee04b5442f32546b3924280dcdcc96cab9d88ed04e474e7ca1471f4444207a9aba1665dbf84c07cdcaefe4de81749

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks