General

  • Target

    QUYT8emMHh3txso.exe

  • Size

    588KB

  • Sample

    240621-jqsagawbpl

  • MD5

    b8ff2443edcaa0557cfdc204b60bd271

  • SHA1

    ba844c1a6efa658462fa3846dc4bc6433b146e0d

  • SHA256

    49faac612eb8f0ba55f03280a326f0866ede162f0cb3ee0f56ade9fa783ba0fd

  • SHA512

    6b1c551709d28b55076f61de56cedadf06e2ad57a056ba6d792f2bb2520dc25c4c08776eebda959efbade9ef74d0664b163ec91238f1b91bcbdcdec2bd89b122

  • SSDEEP

    12288:/L+hEZDUsUyyI9dBGrA9bd1PXnB+VPCLGdAWIB:HUrIYrADNnBwA8I

Malware Config

Extracted

Family

lokibot

C2

http://ulysse-cazabonne.cam/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      QUYT8emMHh3txso.exe

    • Size

      588KB

    • MD5

      b8ff2443edcaa0557cfdc204b60bd271

    • SHA1

      ba844c1a6efa658462fa3846dc4bc6433b146e0d

    • SHA256

      49faac612eb8f0ba55f03280a326f0866ede162f0cb3ee0f56ade9fa783ba0fd

    • SHA512

      6b1c551709d28b55076f61de56cedadf06e2ad57a056ba6d792f2bb2520dc25c4c08776eebda959efbade9ef74d0664b163ec91238f1b91bcbdcdec2bd89b122

    • SSDEEP

      12288:/L+hEZDUsUyyI9dBGrA9bd1PXnB+VPCLGdAWIB:HUrIYrADNnBwA8I

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks