Analysis

  • max time kernel
    161s
  • max time network
    259s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    14-05-2022 13:50

General

  • Target

    ee497c7942e6dcee5f26f13766a9efaddfcee4a98d913107162767ed8c43b3b7.exe

  • Size

    158KB

  • MD5

    f59ee906bc0df423ca26ad7436eedaad

  • SHA1

    35ae6543c6633a36fff11fc09c2bc7e8d95ab747

  • SHA256

    ee497c7942e6dcee5f26f13766a9efaddfcee4a98d913107162767ed8c43b3b7

  • SHA512

    50adbc078fc07b202c63becedb2bd1588cef1de63ba11cf077b7001e3d8672da13b68371622018f7b36537dc41f1fe43cbf99f99b5bc1a86a3ec2bf3e7b9e8af

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/gf17/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

  • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

  • suricata: ET MALWARE LokiBot Checkin

    suricata: ET MALWARE LokiBot Checkin

  • suricata: ET MALWARE LokiBot Fake 404 Response

    suricata: ET MALWARE LokiBot Fake 404 Response

  • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

  • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

  • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee497c7942e6dcee5f26f13766a9efaddfcee4a98d913107162767ed8c43b3b7.exe
    "C:\Users\Admin\AppData\Local\Temp\ee497c7942e6dcee5f26f13766a9efaddfcee4a98d913107162767ed8c43b3b7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Users\Admin\AppData\Local\Temp\kudvb.exe
      C:\Users\Admin\AppData\Local\Temp\kudvb.exe C:\Users\Admin\AppData\Local\Temp\ayrmbdie
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\kudvb.exe
        C:\Users\Admin\AppData\Local\Temp\kudvb.exe C:\Users\Admin\AppData\Local\Temp\ayrmbdie
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ayrmbdie
    Filesize

    5KB

    MD5

    e96de5b43b69f9b97033a7bc80bd2a84

    SHA1

    73e7378750f1741c6191caa7d87678d6771925f8

    SHA256

    2aac125fe00e6f237b4cde2dc15474ca78c6c8398ea51fb56e5ea4e3f4822ac7

    SHA512

    180e4dd08be620688428eb822ad6d647c1c7aeb16dcb540888a0d84adb1ab702e1266630303d68e99153d51abed7e9a4ca8412a96a12d01d9e0a58543860775f

  • C:\Users\Admin\AppData\Local\Temp\kudvb.exe
    Filesize

    78KB

    MD5

    9f997aeddad0aca01b309e9c8f2fa07b

    SHA1

    aa36040964f46cf3282cb6a8279804277fd7bac9

    SHA256

    05c3fb8fc535bc262d651939d0e0e64d27524e0b3d69a0fcb5949bf15b95cfd8

    SHA512

    9124ae5c818f705197a2e95066154a6830d72b95740c9c554b3806fcdbc41512478f4fd5030ddb1455a75510a00322290ed1f48130ffac7249f081e29f553e63

  • C:\Users\Admin\AppData\Local\Temp\kudvb.exe
    Filesize

    78KB

    MD5

    9f997aeddad0aca01b309e9c8f2fa07b

    SHA1

    aa36040964f46cf3282cb6a8279804277fd7bac9

    SHA256

    05c3fb8fc535bc262d651939d0e0e64d27524e0b3d69a0fcb5949bf15b95cfd8

    SHA512

    9124ae5c818f705197a2e95066154a6830d72b95740c9c554b3806fcdbc41512478f4fd5030ddb1455a75510a00322290ed1f48130ffac7249f081e29f553e63

  • C:\Users\Admin\AppData\Local\Temp\kudvb.exe
    Filesize

    78KB

    MD5

    9f997aeddad0aca01b309e9c8f2fa07b

    SHA1

    aa36040964f46cf3282cb6a8279804277fd7bac9

    SHA256

    05c3fb8fc535bc262d651939d0e0e64d27524e0b3d69a0fcb5949bf15b95cfd8

    SHA512

    9124ae5c818f705197a2e95066154a6830d72b95740c9c554b3806fcdbc41512478f4fd5030ddb1455a75510a00322290ed1f48130ffac7249f081e29f553e63

  • C:\Users\Admin\AppData\Local\Temp\tncp1fjt9abk6t0jixa
    Filesize

    103KB

    MD5

    319376065eac95e66d55c24aa65dec10

    SHA1

    258e258b757afaa43f03a511e18d829a95ad9ea9

    SHA256

    cc2ae0ea640bbca548f5bd678f8ee63cc0b7e3d47e4fa7bcccd38aa7545a8f64

    SHA512

    a3bf5629777de003ac8d30eaefa066d4acde3951458f38ec86dcfba7d09077f28a2088155c8111079c77fdda86c46ab8ed07016a000319fd23bde2840ef29076

  • memory/1176-135-0x0000000000000000-mapping.dmp
  • memory/1176-136-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/1176-139-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/1176-140-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/3428-130-0x0000000000000000-mapping.dmp