General

  • Target

    INVOICE.exe

  • Size

    611KB

  • Sample

    201226-e8nfxdm53n

  • MD5

    319e34bf7ecf5c74e8c192be57093d96

  • SHA1

    6d7050466d883a70896610fd377409bec21385a5

  • SHA256

    89ca0ea25e05983099ae8221becde0d57c5528d85d6ab8fd944f7c941437d679

  • SHA512

    84db04cd03c121245a1c59aea6722fa65cb2f9ff108c89ff72d9fed2de51b41e5919e9bbb51f57ccc7abbf914d18691c97eb95b5fd62c920069dba5437552573

Malware Config

Extracted

Family

lokibot

C2

https://deqtmaysoor.com/jah1/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      INVOICE.exe

    • Size

      611KB

    • MD5

      319e34bf7ecf5c74e8c192be57093d96

    • SHA1

      6d7050466d883a70896610fd377409bec21385a5

    • SHA256

      89ca0ea25e05983099ae8221becde0d57c5528d85d6ab8fd944f7c941437d679

    • SHA512

      84db04cd03c121245a1c59aea6722fa65cb2f9ff108c89ff72d9fed2de51b41e5919e9bbb51f57ccc7abbf914d18691c97eb95b5fd62c920069dba5437552573

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader First Stage

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks