General

  • Target

    scan-payment-advice.xlsx

  • Size

    187KB

  • Sample

    220126-prcjasdbg8

  • MD5

    1ee28e0a4fb0347903ccba42bfe31a82

  • SHA1

    270bb16f351de8ca08a44fe9dbbd583f3bab6542

  • SHA256

    fc49b59b9a064969f60a681e7fc0092733b318baa43eaff67ee44536bfae94c5

  • SHA512

    0999063541d08479413b49642a4abc60efb4ffbe86f532ff63b9eabba71096612c792739cb0a2c91ba33074ddad4892319be0afc58dc962784afc8d55f931cdc

Malware Config

Extracted

Family

lokibot

C2

http://62.197.136.186/baba/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      scan-payment-advice.xlsx

    • Size

      187KB

    • MD5

      1ee28e0a4fb0347903ccba42bfe31a82

    • SHA1

      270bb16f351de8ca08a44fe9dbbd583f3bab6542

    • SHA256

      fc49b59b9a064969f60a681e7fc0092733b318baa43eaff67ee44536bfae94c5

    • SHA512

      0999063541d08479413b49642a4abc60efb4ffbe86f532ff63b9eabba71096612c792739cb0a2c91ba33074ddad4892319be0afc58dc962784afc8d55f931cdc

    • Detect Neshta Payload

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

2
T1112

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks