General

  • Target

    Purchase Order No-079 DT 03.10.2022.exe

  • Size

    371KB

  • Sample

    221003-lqds7ahddl

  • MD5

    06d111e86da46ee91aad0b9e3c4ceb7c

  • SHA1

    8fe930a374cd43bc4b1d57f79c6beef78ff77042

  • SHA256

    d7d73c00b7da86c119784a524a81220be76a1804f731ba08618922ef448bdd3c

  • SHA512

    5a3a92361846a9eb2a613e3d1abd287cd68d7cf702950e7d344bd92ddb1b839894c1195750a970b2b85277a80636a2eefb72ff179d179f657e4882a3e81f84f0

  • SSDEEP

    6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/zH3F3rZ30fPMUYjGE:lToPWBv/cpGrU3y8tGzXFbZ0fE3iE

Malware Config

Targets

    • Target

      Purchase Order No-079 DT 03.10.2022.exe

    • Size

      371KB

    • MD5

      06d111e86da46ee91aad0b9e3c4ceb7c

    • SHA1

      8fe930a374cd43bc4b1d57f79c6beef78ff77042

    • SHA256

      d7d73c00b7da86c119784a524a81220be76a1804f731ba08618922ef448bdd3c

    • SHA512

      5a3a92361846a9eb2a613e3d1abd287cd68d7cf702950e7d344bd92ddb1b839894c1195750a970b2b85277a80636a2eefb72ff179d179f657e4882a3e81f84f0

    • SSDEEP

      6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/zH3F3rZ30fPMUYjGE:lToPWBv/cpGrU3y8tGzXFbZ0fE3iE

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks