General

  • Target

    Zahtjevzaponudubroj20240704.cmd

  • Size

    654KB

  • Sample

    240704-ktzpdstajp

  • MD5

    e014b69d3bff34e00e3aa99e7b383cf3

  • SHA1

    27a6cba46a6de403420cc1a1f205a800ba418580

  • SHA256

    11b5aa868e0562612520de22f135ad0a1a768cfa6fa0a8708b7f02f49594d925

  • SHA512

    3f0d823183a6c9c08a2fbb5c7d3552f2f62b1f049be4370a99ca445156716cf82d139cc6269cf08e398e6e20c1c3c08a58daa72fcc8a6deccac59fd474fbf039

  • SSDEEP

    12288:loGcaZaofC1PN5MhJ889qTxvgjg2fUsCeG9CCZ8ltoFzPwS4MABsPqijlmLt5kR:lhXS17MJhm5ifUsCN9CCZOtoCMb

Malware Config

Extracted

Family

lokibot

C2

http://45.61.136.239/index.php/gyr.php?id=1

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Zahtjevzaponudubroj20240704.cmd

    • Size

      654KB

    • MD5

      e014b69d3bff34e00e3aa99e7b383cf3

    • SHA1

      27a6cba46a6de403420cc1a1f205a800ba418580

    • SHA256

      11b5aa868e0562612520de22f135ad0a1a768cfa6fa0a8708b7f02f49594d925

    • SHA512

      3f0d823183a6c9c08a2fbb5c7d3552f2f62b1f049be4370a99ca445156716cf82d139cc6269cf08e398e6e20c1c3c08a58daa72fcc8a6deccac59fd474fbf039

    • SSDEEP

      12288:loGcaZaofC1PN5MhJ889qTxvgjg2fUsCeG9CCZ8ltoFzPwS4MABsPqijlmLt5kR:lhXS17MJhm5ifUsCN9CCZOtoCMb

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Tasks