General

  • Target

    New Order.doc

  • Size

    358KB

  • Sample

    221028-nzlaqsfdf5

  • MD5

    10215dddffc086202b23f3069eb14a1c

  • SHA1

    a93ef33d7b7aef8b2e4296e6644922dc96393e70

  • SHA256

    8d3ead1a4149580c6019ff682e2e77c40391cb01799aec3d25f1c7e6d369517e

  • SHA512

    0985b5858760a6fe6633cce9ac97143ceea82967f4b8bb9ddf60d5455344871447117cb2be2e24508776a9ef0e65a35fd35b8d58741c509e39cf6a10223b0cc8

  • SSDEEP

    384:OLJshTShevdvGyuRx6KI8y9d+v1ZsPWWJZ:mJshmhevAyMx6YZaZ

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.161/wealth/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      New Order.doc

    • Size

      358KB

    • MD5

      10215dddffc086202b23f3069eb14a1c

    • SHA1

      a93ef33d7b7aef8b2e4296e6644922dc96393e70

    • SHA256

      8d3ead1a4149580c6019ff682e2e77c40391cb01799aec3d25f1c7e6d369517e

    • SHA512

      0985b5858760a6fe6633cce9ac97143ceea82967f4b8bb9ddf60d5455344871447117cb2be2e24508776a9ef0e65a35fd35b8d58741c509e39cf6a10223b0cc8

    • SSDEEP

      384:OLJshTShevdvGyuRx6KI8y9d+v1ZsPWWJZ:mJshmhevAyMx6YZaZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks