Analysis

  • max time kernel
    132s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 19:47

General

  • Target

    4b59e43a9ca1e953099df4cf8fddc74e6c243bef1f38236ed8b5189c67046f00.exe

  • Size

    123KB

  • MD5

    618a2d701411384c8d7af09ee5d066ca

  • SHA1

    3deba40d472f334a42715049e315b5cb5f095a75

  • SHA256

    4b59e43a9ca1e953099df4cf8fddc74e6c243bef1f38236ed8b5189c67046f00

  • SHA512

    45d8f4ab395e8d4c7a2676b3f6177769fd9c57d262576da8a4bdf9b08c993f7550042ebe6dcb670e63a4fcebef657fb1b327ba95a44d9ef9f9820f9f706e4c08

Malware Config

Extracted

Family

lokibot

C2

http://lokaxz.xyz/fc/bk/ss.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

  • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

  • suricata: ET MALWARE LokiBot Checkin

    suricata: ET MALWARE LokiBot Checkin

  • suricata: ET MALWARE LokiBot Fake 404 Response

    suricata: ET MALWARE LokiBot Fake 404 Response

  • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

  • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

  • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b59e43a9ca1e953099df4cf8fddc74e6c243bef1f38236ed8b5189c67046f00.exe
    "C:\Users\Admin\AppData\Local\Temp\4b59e43a9ca1e953099df4cf8fddc74e6c243bef1f38236ed8b5189c67046f00.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Users\Admin\AppData\Local\Temp\djzcnyd.exe
      C:\Users\Admin\AppData\Local\Temp\djzcnyd.exe C:\Users\Admin\AppData\Local\Temp\wnisy
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3472
      • C:\Users\Admin\AppData\Local\Temp\djzcnyd.exe
        C:\Users\Admin\AppData\Local\Temp\djzcnyd.exe C:\Users\Admin\AppData\Local\Temp\wnisy
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1864

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\djzcnyd.exe
    Filesize

    3KB

    MD5

    a47e15440e424798a6a793d8d72dfa59

    SHA1

    61fee0cca0ebfd836c9ed0960645d58b46605c04

    SHA256

    83f2662ffd4390f87eaaa9284eddf2be8d31e933aaf4c9202c528f9dea42d26f

    SHA512

    e60326bef274f74030b2381305dabf965c1b3fc41d87349178f08ddddccd1e025ebfde40ef18224d73360872f86db862ec545d07182d17b924a22d5247449be4

  • C:\Users\Admin\AppData\Local\Temp\djzcnyd.exe
    Filesize

    3KB

    MD5

    a47e15440e424798a6a793d8d72dfa59

    SHA1

    61fee0cca0ebfd836c9ed0960645d58b46605c04

    SHA256

    83f2662ffd4390f87eaaa9284eddf2be8d31e933aaf4c9202c528f9dea42d26f

    SHA512

    e60326bef274f74030b2381305dabf965c1b3fc41d87349178f08ddddccd1e025ebfde40ef18224d73360872f86db862ec545d07182d17b924a22d5247449be4

  • C:\Users\Admin\AppData\Local\Temp\djzcnyd.exe
    Filesize

    3KB

    MD5

    a47e15440e424798a6a793d8d72dfa59

    SHA1

    61fee0cca0ebfd836c9ed0960645d58b46605c04

    SHA256

    83f2662ffd4390f87eaaa9284eddf2be8d31e933aaf4c9202c528f9dea42d26f

    SHA512

    e60326bef274f74030b2381305dabf965c1b3fc41d87349178f08ddddccd1e025ebfde40ef18224d73360872f86db862ec545d07182d17b924a22d5247449be4

  • C:\Users\Admin\AppData\Local\Temp\lkkkjq38e46xtb6cs
    Filesize

    103KB

    MD5

    61a2f1be979695d7d6294ce0bcf9797b

    SHA1

    29e9a3ac3979cba1922a103b6b95b6d69d900fce

    SHA256

    d3fca9ee80df9294da6e2b7e1fd3ec0e292ec1ec546953ed760610e3574290ad

    SHA512

    c5d4ed57678b9c3f36251ac8f68877a7edd6bf8f45b40ebc09d722b5e6fe42196ff46bbef64586517ce60f98112d237bc56d2ec9437eb19bf962a2330496a850

  • C:\Users\Admin\AppData\Local\Temp\wnisy
    Filesize

    4KB

    MD5

    0ca3c2a3cdbf478602b19e97a93194d2

    SHA1

    538aa143dfd362cc07ade7613405da7f96093e4a

    SHA256

    5b17dee8b36e60789014498bdcb3d548532f758837d1779f23006b37d6cda637

    SHA512

    d972f4596d6543ef597259c365d1aeae6df27620c1403a22c1bae755b0172fa6626bc5ed68c1041edc8829444d6a95aa56c79407476dfd4a0ea233b802043cab

  • memory/1864-135-0x0000000000000000-mapping.dmp
  • memory/1864-136-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/1864-139-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/1864-140-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/3472-130-0x0000000000000000-mapping.dmp