General

  • Target

    Final_Payment_pdf.exe

  • Size

    400KB

  • Sample

    220930-qc7lkadfa5

  • MD5

    d5364b02f515d184a7fd755eb055beaf

  • SHA1

    e4095f3b4b863a8cce94e7f9cb27c0a8c73d76c0

  • SHA256

    e15845b223b3a5eaebf650ca11a8e8990216b0c2f4db0f77cadf9806984daa69

  • SHA512

    5e974224a87848b0ebe0ba4cedfa75b22fd3919a6520957f57cfd1e0816baa30ccb0e8a48d608bd22fb377a623584c3b85a706aed1f80520f0401be8b3aac4d5

  • SSDEEP

    6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/C0op2YGQdu905S6JnXfUUaZ:lToPWBv/cpGrU3y8tGtoYYGNS5S6Jnq

Malware Config

Targets

    • Target

      Final_Payment_pdf.exe

    • Size

      400KB

    • MD5

      d5364b02f515d184a7fd755eb055beaf

    • SHA1

      e4095f3b4b863a8cce94e7f9cb27c0a8c73d76c0

    • SHA256

      e15845b223b3a5eaebf650ca11a8e8990216b0c2f4db0f77cadf9806984daa69

    • SHA512

      5e974224a87848b0ebe0ba4cedfa75b22fd3919a6520957f57cfd1e0816baa30ccb0e8a48d608bd22fb377a623584c3b85a706aed1f80520f0401be8b3aac4d5

    • SSDEEP

      6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/C0op2YGQdu905S6JnXfUUaZ:lToPWBv/cpGrU3y8tGtoYYGNS5S6Jnq

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks