Analysis
-
max time kernel
140s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 14:55
Static task
static1
Behavioral task
behavioral1
Sample
MG.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
MG.exe
Resource
win10v2004-20220414-en
General
-
Target
MG.exe
-
Size
952KB
-
MD5
ac2050045490765486fd6d6bfbb3c911
-
SHA1
e774dbc8a8d8b2a1c5961fa54292fde6e25e7f60
-
SHA256
cb883714a2096a2288932aa459a5816d45ec250e241164f8ec0b01c87e9dbe08
-
SHA512
711e48c28c21f6e3c660582d4698e5c79c3b810a774475084a7f1d684c3f7490cada914dd6f54e495078622c9bf2df32446faaac7773be98f9207396b07da070
Malware Config
Extracted
lokibot
http://107.175.150.73/~giftioz/.rojonm/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
MG.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MG.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook MG.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook MG.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MG.exedescription pid process target process PID 876 set thread context of 1872 876 MG.exe MG.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MG.exepid process 876 MG.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MG.exepid process 876 MG.exe 876 MG.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
MG.exedescription pid process target process PID 876 wrote to memory of 1872 876 MG.exe MG.exe PID 876 wrote to memory of 1872 876 MG.exe MG.exe PID 876 wrote to memory of 1872 876 MG.exe MG.exe PID 876 wrote to memory of 1872 876 MG.exe MG.exe -
outlook_office_path 1 IoCs
Processes:
MG.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook MG.exe -
outlook_win_path 1 IoCs
Processes:
MG.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MG.exe"C:\Users\Admin\AppData\Local\Temp\MG.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\MG.exe"C:\Users\Admin\AppData\Local\Temp\MG.exe"2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1872