General

  • Target

    tmp/c2a82bda3c388a3797d84e1078b1b66ee74430aa4f26afb46cd190f2fc8b68ab.xls

  • Size

    229KB

  • Sample

    211206-j1pbkadegl

  • MD5

    dd939aae349dc2b9add3f26114da4a73

  • SHA1

    160a127eecd37636c220f5c149913259d017717a

  • SHA256

    c2a82bda3c388a3797d84e1078b1b66ee74430aa4f26afb46cd190f2fc8b68ab

  • SHA512

    3acfb39ccd30f17eb390229200ad92301e17cb84ff726ff587e8644c1b96f610cc4913e2f59c0409a6c53546ea7d262e79732a938b2171e74d9daed47914b52f

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/gb22/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      tmp/c2a82bda3c388a3797d84e1078b1b66ee74430aa4f26afb46cd190f2fc8b68ab.xls

    • Size

      229KB

    • MD5

      dd939aae349dc2b9add3f26114da4a73

    • SHA1

      160a127eecd37636c220f5c149913259d017717a

    • SHA256

      c2a82bda3c388a3797d84e1078b1b66ee74430aa4f26afb46cd190f2fc8b68ab

    • SHA512

      3acfb39ccd30f17eb390229200ad92301e17cb84ff726ff587e8644c1b96f610cc4913e2f59c0409a6c53546ea7d262e79732a938b2171e74d9daed47914b52f

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks