Resubmissions

21-09-2023 11:33

230921-nn95qafg3v 10

02-11-2022 12:12

221102-pdb1lsbga7 10

02-11-2022 12:08

221102-pa3n6abfh9 10

04-10-2022 19:21

221004-x2v3dscae5 10

General

  • Target

    55801ba9000cdfd3f15bbe58910e2775

  • Size

    326KB

  • Sample

    221102-pdb1lsbga7

  • MD5

    55801ba9000cdfd3f15bbe58910e2775

  • SHA1

    04be9d2af044e19d76b90a6fff33a418ce80a5ce

  • SHA256

    16f278621ca4e51187507b4eb6568bd0b50cd76bc9d62c801a9febcd7480bdef

  • SHA512

    995371fa56fcd9fb12c7b31ea05112ace62d0d310af3f94f0eb4035d779f1d40179d966df03e9990ce1eef68ef5d8eb5f99105df0f074bf849e40ec3fea2ee28

  • SSDEEP

    6144:yW51HBbe+ZSp5vKkRaIM6KBFGfIW9WUFsNQhVzEFnRgfkmOzwcG32NXLDMu/Ku:yW5tBbe+wp9gHF9W1sw8gs62NXUu

Malware Config

Targets

    • Target

      55801ba9000cdfd3f15bbe58910e2775

    • Size

      326KB

    • MD5

      55801ba9000cdfd3f15bbe58910e2775

    • SHA1

      04be9d2af044e19d76b90a6fff33a418ce80a5ce

    • SHA256

      16f278621ca4e51187507b4eb6568bd0b50cd76bc9d62c801a9febcd7480bdef

    • SHA512

      995371fa56fcd9fb12c7b31ea05112ace62d0d310af3f94f0eb4035d779f1d40179d966df03e9990ce1eef68ef5d8eb5f99105df0f074bf849e40ec3fea2ee28

    • SSDEEP

      6144:yW51HBbe+ZSp5vKkRaIM6KBFGfIW9WUFsNQhVzEFnRgfkmOzwcG32NXLDMu/Ku:yW5tBbe+wp9gHF9W1sw8gs62NXUu

    Score
    6/10
    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Target

      Purchase Order No-079 DT 03.10.2022.lz

    • Size

      237KB

    • MD5

      0f9ed5b8c3ae73ba83b97cc127cc4779

    • SHA1

      de33c6989cce77f8cfb85348fb9485345dd3cfb9

    • SHA256

      ff97257ceba9a754104fc6f4eaa204e63ee38f940f9d59818cdb74525e5047c4

    • SHA512

      35b52bc5b782d08a8ed9fd74a0c98048cdc110016a5d5be59467de4d0ecbb0b8b3e20ec04ac7a324956833cb94b57614b027ec56ca36dc66756647d06daf5de4

    • SSDEEP

      6144:NdAq/kmY4KTaqMRf+X0fCmcR/g1o3MLCuba:NdAqc8qMIXDbm6uba

    Score
    3/10
    • Target

      Purchase Order No-079 DT 03.10.2022.exe

    • Size

      371KB

    • MD5

      06d111e86da46ee91aad0b9e3c4ceb7c

    • SHA1

      8fe930a374cd43bc4b1d57f79c6beef78ff77042

    • SHA256

      d7d73c00b7da86c119784a524a81220be76a1804f731ba08618922ef448bdd3c

    • SHA512

      5a3a92361846a9eb2a613e3d1abd287cd68d7cf702950e7d344bd92ddb1b839894c1195750a970b2b85277a80636a2eefb72ff179d179f657e4882a3e81f84f0

    • SSDEEP

      6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/zH3F3rZ30fPMUYjGE:lToPWBv/cpGrU3y8tGzXFbZ0fE3iE

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

    • Target

      email-html-1.txt

    • Size

      10B

    • MD5

      f180d707d51902f27246d9e368145585

    • SHA1

      eee0c8f4147a2896c1571056f0f026dd1ec32c49

    • SHA256

      017ad73325fcf108a972edac618f9edfc957c5b1de10f8b371b0a8bfa4f59e2d

    • SHA512

      2c6b2a77dec96742eca3b83501e0feb34e4325857923e6737ddece554d72d6545d3ac1316edb79d780307b296eea513357c111812fc4afc1a5f787d5049e11ed

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

4
T1082

Query Registry

1
T1012

Collection

Email Collection

2
T1114

Data from Local System

1
T1005

Tasks