General

  • Target

    959510b24672d68d5d5b2ee9a060bdb7440b1b094fde76056e639f31eb44214b

  • Size

    290KB

  • Sample

    220521-cza9zsega7

  • MD5

    3637e866d067ad9734c9c67315247df2

  • SHA1

    c1f987c863d5e6aaf8403bc59b6c2333433e9d1e

  • SHA256

    959510b24672d68d5d5b2ee9a060bdb7440b1b094fde76056e639f31eb44214b

  • SHA512

    eb357f0aecc7eff426dbb598c9f7e87c890c0d01a118b935104a26c415314722341267b3d33cb34ea577fd1dd2c8aabf35a45c83850fbbe6a45fc6b3aa9109bd

Malware Config

Extracted

Family

lokibot

C2

http://mecharnise.ir/ea2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      AWB 673687387678.exe

    • Size

      229KB

    • MD5

      84a67aa32e44af3aa1818aa45cc6fb2c

    • SHA1

      a437b64ab0e807952566ea06833220992b09367b

    • SHA256

      72f5afab926594158b15b13d03b5df7771e35f096377ff6b052b7017661cd189

    • SHA512

      305ed05327bab0427c2927b03c2c5a0af0dd60fbdd973078d6ede3f129e12f4055d77d3d4f7b2efe05c33f94e47b73d2cd564e25c97afac7f522adbc7cbbf24f

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Looks for VirtualBox Guest Additions in registry

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks