General

  • Target

    SOA JUNE.exe

  • Size

    176KB

  • Sample

    230727-l43z8sdh85

  • MD5

    0be76c19f43277d0b6342ecef7b9d9d5

  • SHA1

    d4e7f82cbab575ea5eae1e52dfcffc63eb50f33f

  • SHA256

    e83b0e26058ef4f99d65b636a50038f67f1cee47cde9ae818ab10386155ca476

  • SHA512

    1e44b338c14d02d7acd998befa4d933362419fde425846bb33ee13acdcb7b78bfd88d1e6b211b0668677608e2b1aaccd0c6fd6ab3bafe693877c6b18ff823a0c

  • SSDEEP

    3072:HfY/TU9fE9PEtuebEut0SytJI9e2ceqg1zZsmAJVZnC/S6F/2dOrX/a//9DYFQ+F:/Ya6G5tlnbcxgHsZA/2dOTa//5YOE

Malware Config

Extracted

Family

lokibot

C2

http://87.121.47.132/noko/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SOA JUNE.exe

    • Size

      176KB

    • MD5

      0be76c19f43277d0b6342ecef7b9d9d5

    • SHA1

      d4e7f82cbab575ea5eae1e52dfcffc63eb50f33f

    • SHA256

      e83b0e26058ef4f99d65b636a50038f67f1cee47cde9ae818ab10386155ca476

    • SHA512

      1e44b338c14d02d7acd998befa4d933362419fde425846bb33ee13acdcb7b78bfd88d1e6b211b0668677608e2b1aaccd0c6fd6ab3bafe693877c6b18ff823a0c

    • SSDEEP

      3072:HfY/TU9fE9PEtuebEut0SytJI9e2ceqg1zZsmAJVZnC/S6F/2dOrX/a//9DYFQ+F:/Ya6G5tlnbcxgHsZA/2dOTa//5YOE

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks