General

  • Target

    Attached Details.exe

  • Size

    537KB

  • Sample

    211202-j55t4sdbdm

  • MD5

    be45f415c556a8772077f9c60ea9cbf8

  • SHA1

    9bc8f15e06e5d5cb7baa875d7b30685e049cc683

  • SHA256

    edca5671042af86bafb53a556aace35639b5ccabd30efe4d7e4a5baa61040a3d

  • SHA512

    2e04d7a57fa1d5ce4612cd21fd265aebe70a260b2ec81400ec78bbd86b8b443a9de6f647100c5dfa49279e3d2d42c5c4c2954269a86b6ba7081de3dffaef8925

Malware Config

Extracted

Family

lokibot

C2

https://noithatcombo.com.vn/.stop/need/work/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Attached Details.exe

    • Size

      537KB

    • MD5

      be45f415c556a8772077f9c60ea9cbf8

    • SHA1

      9bc8f15e06e5d5cb7baa875d7b30685e049cc683

    • SHA256

      edca5671042af86bafb53a556aace35639b5ccabd30efe4d7e4a5baa61040a3d

    • SHA512

      2e04d7a57fa1d5ce4612cd21fd265aebe70a260b2ec81400ec78bbd86b8b443a9de6f647100c5dfa49279e3d2d42c5c4c2954269a86b6ba7081de3dffaef8925

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks