General

  • Target

    Final_SOA_Remittance_pdf.exe

  • Size

    400KB

  • Sample

    221004-mss7bsafa7

  • MD5

    c62bb46d419468711b5304c4bd062760

  • SHA1

    effe10a743d968476dfb979d7a1d0d7d5b453fa1

  • SHA256

    5a85a87ee1049fe5ff2bdf482d60ac66f1a21ceda0c983e75900dbb5b779ad2f

  • SHA512

    e2ef914d5684a0d08513771dd4867e2e726afa517a0c3f7a61f86f39bc858a46869561260c3f7ebdd92fe794451b146152aa036f48f114f63c710b19d0ed5e6d

  • SSDEEP

    6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/+vrWmybQVu1kFB3Unt7vK5FVMCZlgBneOC:lToPWBv/cpGrU3y8tGb112B3VFV/EC

Malware Config

Targets

    • Target

      Final_SOA_Remittance_pdf.exe

    • Size

      400KB

    • MD5

      c62bb46d419468711b5304c4bd062760

    • SHA1

      effe10a743d968476dfb979d7a1d0d7d5b453fa1

    • SHA256

      5a85a87ee1049fe5ff2bdf482d60ac66f1a21ceda0c983e75900dbb5b779ad2f

    • SHA512

      e2ef914d5684a0d08513771dd4867e2e726afa517a0c3f7a61f86f39bc858a46869561260c3f7ebdd92fe794451b146152aa036f48f114f63c710b19d0ed5e6d

    • SSDEEP

      6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/+vrWmybQVu1kFB3Unt7vK5FVMCZlgBneOC:lToPWBv/cpGrU3y8tGb112B3VFV/EC

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks