General

  • Target

    SOA_LOGISTICS CO LTD_IBERIA_pdf.exe

  • Size

    371KB

  • Sample

    221004-hgxm6agcep

  • MD5

    204e4b10dbd1ceeb5f0e82b38a1fe524

  • SHA1

    b603e2444810ba05a61c51a3bb63796d00f387d9

  • SHA256

    d66671894b4128adf6ff365ef0769f831bfe4738c7452f1e094b0e35dda94b8a

  • SHA512

    b3f8716e1fe7b1d9cdfca5eadbd846abe99cf8055950e3f88099a1665943dbef1c09b8c66af7bb70f389c350199d7adfc8748d3a01d3fe3627f0654e6a7601af

  • SSDEEP

    6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/dLeFJW8pbHPNKviX8R66TYXr:lToPWBv/cpGrU3y8tGdLuJW8pbPNKKsY

Malware Config

Targets

    • Target

      SOA_LOGISTICS CO LTD_IBERIA_pdf.exe

    • Size

      371KB

    • MD5

      204e4b10dbd1ceeb5f0e82b38a1fe524

    • SHA1

      b603e2444810ba05a61c51a3bb63796d00f387d9

    • SHA256

      d66671894b4128adf6ff365ef0769f831bfe4738c7452f1e094b0e35dda94b8a

    • SHA512

      b3f8716e1fe7b1d9cdfca5eadbd846abe99cf8055950e3f88099a1665943dbef1c09b8c66af7bb70f389c350199d7adfc8748d3a01d3fe3627f0654e6a7601af

    • SSDEEP

      6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/dLeFJW8pbHPNKviX8R66TYXr:lToPWBv/cpGrU3y8tGdLuJW8pbPNKKsY

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks