General

  • Target

    PD3007800123.vbs

  • Size

    219KB

  • Sample

    221003-mee3jshdgm

  • MD5

    d873de1b3b907887305e325426c407d5

  • SHA1

    99c502d13b119a1b614f7384a3ba83fab10cd85d

  • SHA256

    eedb863078dbdbd83a0d52d86dd779f27115360e17676e539602f4e1a8c9437c

  • SHA512

    c4577d024fbbd2ea7b143d9780c7ca9f813f914c7d820151acfcc5ba7a92ebea832537a9847b5a7d203df6f00186be6d9bc5a26e515c705badeee985def3ffa1

  • SSDEEP

    48:DVK0hbQvuivLvyvTxYvsvuiv7vu2vJR2vFvvvfv1KvFvDv2UfHvrvUvgYvc2vGgR:xKWdUIlVcWHfvGvXimF

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://20.7.14.99/dll/dll_ink.pdf

Extracted

Family

lokibot

C2

http://iklok.us/li/UN/yours_me.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PD3007800123.vbs

    • Size

      219KB

    • MD5

      d873de1b3b907887305e325426c407d5

    • SHA1

      99c502d13b119a1b614f7384a3ba83fab10cd85d

    • SHA256

      eedb863078dbdbd83a0d52d86dd779f27115360e17676e539602f4e1a8c9437c

    • SHA512

      c4577d024fbbd2ea7b143d9780c7ca9f813f914c7d820151acfcc5ba7a92ebea832537a9847b5a7d203df6f00186be6d9bc5a26e515c705badeee985def3ffa1

    • SSDEEP

      48:DVK0hbQvuivLvyvTxYvsvuiv7vu2vJR2vFvvvfv1KvFvDv2UfHvrvUvgYvc2vGgR:xKWdUIlVcWHfvGvXimF

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks