General

  • Target

    lokibot1.exe

  • Size

    491KB

  • Sample

    240617-h4ljeazdla

  • MD5

    1a5ac349e153a9e2927c8f8e13512942

  • SHA1

    428d38db93636fcdba6d3ecc81cd1a87da4fb8fe

  • SHA256

    85b290b96ca4f8961e4782cce593270116d246dbd243c3eb2b4121542cae8e71

  • SHA512

    6006ecc131a03aa6d0f294677f2b07d1811b9600d3c4839c03fecaeafe6740bd5b47b92e49b5e78c526f821c96988190fdca3d14444982b74e5a20b4b93430c2

  • SSDEEP

    12288:3Kz/iFIsPAb/z/gPhtEnBNU8kvKQ4RYHLVfnGICwMj+ABq/:6zkIKybuirULB4KZB3MqAI

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/882842611

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      lokibot1.exe

    • Size

      491KB

    • MD5

      1a5ac349e153a9e2927c8f8e13512942

    • SHA1

      428d38db93636fcdba6d3ecc81cd1a87da4fb8fe

    • SHA256

      85b290b96ca4f8961e4782cce593270116d246dbd243c3eb2b4121542cae8e71

    • SHA512

      6006ecc131a03aa6d0f294677f2b07d1811b9600d3c4839c03fecaeafe6740bd5b47b92e49b5e78c526f821c96988190fdca3d14444982b74e5a20b4b93430c2

    • SSDEEP

      12288:3Kz/iFIsPAb/z/gPhtEnBNU8kvKQ4RYHLVfnGICwMj+ABq/:6zkIKybuirULB4KZB3MqAI

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks