Analysis

  • max time kernel
    125s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-01-2022 16:27

General

  • Target

    Cotizaciónpdf.exe

  • Size

    245KB

  • MD5

    3fe29e21698212a70e03144bb4979632

  • SHA1

    b400de247096542b778aa7ed7584f6829b5bbf4e

  • SHA256

    c42005e0a00c3ecbaff6c1189ca8b6f1298a818878ceaebb623585c399c8ba81

  • SHA512

    a37080b42f317bcaf288acc2ede4fd178bf8227a6f0650b61378e829458fb26808f6fb64250e32bb737f583ddb75264c1fde488e31ceb57d7890005f04ab723d

Malware Config

Extracted

Family

lokibot

C2

http://slimpackage.com/slimmain/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • suricata: ET MALWARE LokiBot Checkin

    suricata: ET MALWARE LokiBot Checkin

  • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cotizaciónpdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Cotizaciónpdf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Users\Admin\AppData\Local\Temp\Cotizaciónpdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Cotizaciónpdf.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1296

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsyDC2E.tmp\tjbqk.dll
    MD5

    eed28d9a6df23d102eb1e7db08e9b8a8

    SHA1

    b1ea3474da51812f436c0d65178aaee00c916628

    SHA256

    2107ef7267ead9add2cbd586f121a505dcc92db08f9e61d6e2ccca056d4deed5

    SHA512

    8b133190af32cf0b5c0c5e1b93d84c3ae1a9494ebd0419cd911784804e74232fa15ad4f6d787e897af05e90dd2801772c03dea1282ded7921af25eb0fbe353ab

  • memory/1296-57-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/1296-58-0x00000000004139DE-mapping.dmp
  • memory/1296-60-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/1332-55-0x0000000075F91000-0x0000000075F93000-memory.dmp
    Filesize

    8KB