General

  • Target

    Invoice_PG_008946.xlsx

  • Size

    1.1MB

  • Sample

    210727-knvz78pbj6

  • MD5

    1dffded46a39053ed2e4c5d178cb1a87

  • SHA1

    51fb859291867bdba9dea197f4788f8ffcb76f8d

  • SHA256

    3964f3eb14c348d5578e1b758c9cb25d792aa287c24b57f8371729996dc118fc

  • SHA512

    cc004416d43fae81ece3b09a0f41f29d022f0a0b7cb64d1363eaf5ad6a798213ef740108a9b56660fd853a6bfcbfe56fbe842cd7ce6ae4e54bf7ee63d8230804

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.18/dsaicosaicasdi.php/jRbn3g7uWVTsx

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Invoice_PG_008946.xlsx

    • Size

      1.1MB

    • MD5

      1dffded46a39053ed2e4c5d178cb1a87

    • SHA1

      51fb859291867bdba9dea197f4788f8ffcb76f8d

    • SHA256

      3964f3eb14c348d5578e1b758c9cb25d792aa287c24b57f8371729996dc118fc

    • SHA512

      cc004416d43fae81ece3b09a0f41f29d022f0a0b7cb64d1363eaf5ad6a798213ef740108a9b56660fd853a6bfcbfe56fbe842cd7ce6ae4e54bf7ee63d8230804

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks