General

  • Target

    77a93431058bd047444be5a23d9bc4a0c2c7142b79c7988f984141e81d317760.exe

  • Size

    504KB

  • Sample

    240619-bvmlsa1ejf

  • MD5

    e858270c07905d87972aa5d58e82555d

  • SHA1

    006318fca7b778666fc4a6b0a4d397933cbeeef2

  • SHA256

    77a93431058bd047444be5a23d9bc4a0c2c7142b79c7988f984141e81d317760

  • SHA512

    f64fcf8658b50a3e0bd6f69527253cdfb7663e38b36d33fa80e3a7651665eaee96398cfff7b76a2064a48fc56e6e9aceb09e5b0f7f2a9c8ce0ff125cddb57936

  • SSDEEP

    12288:CFIsPAv5EmdFpLdsUuY9gY/VYfc+e1lR5PDD:MIKo/BRXuOgY/VYfc+e7

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/935156794695

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      77a93431058bd047444be5a23d9bc4a0c2c7142b79c7988f984141e81d317760.exe

    • Size

      504KB

    • MD5

      e858270c07905d87972aa5d58e82555d

    • SHA1

      006318fca7b778666fc4a6b0a4d397933cbeeef2

    • SHA256

      77a93431058bd047444be5a23d9bc4a0c2c7142b79c7988f984141e81d317760

    • SHA512

      f64fcf8658b50a3e0bd6f69527253cdfb7663e38b36d33fa80e3a7651665eaee96398cfff7b76a2064a48fc56e6e9aceb09e5b0f7f2a9c8ce0ff125cddb57936

    • SSDEEP

      12288:CFIsPAv5EmdFpLdsUuY9gY/VYfc+e1lR5PDD:MIKo/BRXuOgY/VYfc+e7

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks