Resubmissions

21-09-2023 11:33

230921-nn95qafg3v 10

02-11-2022 12:12

221102-pdb1lsbga7 10

02-11-2022 12:08

221102-pa3n6abfh9 10

04-10-2022 19:21

221004-x2v3dscae5 10

General

  • Target

    55801ba9000cdfd3f15bbe58910e2775

  • Size

    326KB

  • Sample

    221004-x2v3dscae5

  • MD5

    55801ba9000cdfd3f15bbe58910e2775

  • SHA1

    04be9d2af044e19d76b90a6fff33a418ce80a5ce

  • SHA256

    16f278621ca4e51187507b4eb6568bd0b50cd76bc9d62c801a9febcd7480bdef

  • SHA512

    995371fa56fcd9fb12c7b31ea05112ace62d0d310af3f94f0eb4035d779f1d40179d966df03e9990ce1eef68ef5d8eb5f99105df0f074bf849e40ec3fea2ee28

  • SSDEEP

    6144:yW51HBbe+ZSp5vKkRaIM6KBFGfIW9WUFsNQhVzEFnRgfkmOzwcG32NXLDMu/Ku:yW5tBbe+wp9gHF9W1sw8gs62NXUu

Malware Config

Targets

    • Target

      Purchase Order No-079 DT 03.10.2022.exe

    • Size

      371KB

    • MD5

      06d111e86da46ee91aad0b9e3c4ceb7c

    • SHA1

      8fe930a374cd43bc4b1d57f79c6beef78ff77042

    • SHA256

      d7d73c00b7da86c119784a524a81220be76a1804f731ba08618922ef448bdd3c

    • SHA512

      5a3a92361846a9eb2a613e3d1abd287cd68d7cf702950e7d344bd92ddb1b839894c1195750a970b2b85277a80636a2eefb72ff179d179f657e4882a3e81f84f0

    • SSDEEP

      6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/zH3F3rZ30fPMUYjGE:lToPWBv/cpGrU3y8tGzXFbZ0fE3iE

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks