General

  • Target

    MT103 101T000000018.xlsx

  • Size

    1.2MB

  • Sample

    210727-s9vqd11ra2

  • MD5

    7c13958c9636c3b2542a71d3eacf93b9

  • SHA1

    61bab72e6b532ef51cfd36e7836c97b992e62fce

  • SHA256

    0f77e014b10cc25d53aeb14e1eff9271f9b7f16aca4c196fc082dd3207191b28

  • SHA512

    18f7820c0bde66589a0982ca3f570e6d56666215d32053a61cd8f42d2d13c145ac12b875937d4d2cbd07abe2a1d9514c9064a60c5d52d533b0ea461c25168ea8

Malware Config

Extracted

Family

lokibot

C2

http://asiatrans.cf/BN1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      MT103 101T000000018.xlsx

    • Size

      1.2MB

    • MD5

      7c13958c9636c3b2542a71d3eacf93b9

    • SHA1

      61bab72e6b532ef51cfd36e7836c97b992e62fce

    • SHA256

      0f77e014b10cc25d53aeb14e1eff9271f9b7f16aca4c196fc082dd3207191b28

    • SHA512

      18f7820c0bde66589a0982ca3f570e6d56666215d32053a61cd8f42d2d13c145ac12b875937d4d2cbd07abe2a1d9514c9064a60c5d52d533b0ea461c25168ea8

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks