General

  • Target

    SHIPPMENT schedule_MAR.pdf.arj

  • Size

    134KB

  • Sample

    210225-vkfez8vc22

  • MD5

    da0ccf2cf77ed9e00dc671734c1ce985

  • SHA1

    ca0609617094c1c1a2bdec93c80abe68beafc7e1

  • SHA256

    8f84f1e36f81bac0dccda625481d13c903613442205a608c69c59208cf1b59dd

  • SHA512

    9697b721e8145b2cfbee2c21630926fafe8a13cf49cd1e80422b6d1d5c37d6648609de59e6ce4c22be25dbacd3894b2484bd70d4408e2adacd03298c721aa8c1

Malware Config

Extracted

Family

lokibot

C2

http://becharnise.ir/fb5/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SHIPPMENT schedule_MAR_pdf.exe

    • Size

      149KB

    • MD5

      a06abfdd225808a4d1c1d63caf4d3f30

    • SHA1

      a28b6a4112f62d280cefa241fcd63f2d84006713

    • SHA256

      9f6c945fb700d725ed1f031251bf2247a49c724375639fcc8c9650a59f319ebe

    • SHA512

      26a8298793d56971bc6612ce05ccdf72d905dc6ca0fe354f39b835967cdf0bc97735d0f7abc9fb44ce450b1fb60e8fe156c78ed808caaf14a55b3c77022a771b

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks