General

  • Target

    PROFORMANew PO N. FM 22062021.xlsx

  • Size

    1.2MB

  • Sample

    210624-7ctx5cf41e

  • MD5

    f61308f87b0af6dfc5433561025f9ab1

  • SHA1

    ad4bd9e24ea51bc8d58dd38f628b69fb87476a5c

  • SHA256

    b7ee3ada772d88b86d6f285aecbf7b0ab5273522af3766223b06c3163d48991c

  • SHA512

    241e1abbb118053dc67b58fef842b8ad93391537da6f7e146ef27e39a03d693c2fcb749d393162a70cb46874e9c83447a74ded10c16eb4fb274c7a133d84fd95

Malware Config

Extracted

Family

lokibot

C2

http://63.141.228.141/32.php/S4wFP8QBww9Tp

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PROFORMANew PO N. FM 22062021.xlsx

    • Size

      1.2MB

    • MD5

      f61308f87b0af6dfc5433561025f9ab1

    • SHA1

      ad4bd9e24ea51bc8d58dd38f628b69fb87476a5c

    • SHA256

      b7ee3ada772d88b86d6f285aecbf7b0ab5273522af3766223b06c3163d48991c

    • SHA512

      241e1abbb118053dc67b58fef842b8ad93391537da6f7e146ef27e39a03d693c2fcb749d393162a70cb46874e9c83447a74ded10c16eb4fb274c7a133d84fd95

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks