General

  • Target

    MT103 Swift output.doc

  • Size

    27KB

  • Sample

    221125-g38rwabd5v

  • MD5

    8a87321a096ef3926c626e44fc58fb4c

  • SHA1

    9bec3b1a0fcb3369d9635351455afc944a5d0530

  • SHA256

    caaac2649b57e658e83daff19e510575c9a53b8fc91dd55aefd278191d00f2dc

  • SHA512

    179e75701ed999fb92ea3d66d0cff2f3d3f825e77a3d351646d29707cefeb794fb13848037426aabfa3b3bf5a8a823f358f88b0ab43fd6f6a357b5bf03542cae

  • SSDEEP

    768:cFx0XaIsnPRIa4fwJMB5VD55pToHsKaGPEtdI:cf0Xvx3EMXT5p1KnPidI

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.164/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      MT103 Swift output.doc

    • Size

      27KB

    • MD5

      8a87321a096ef3926c626e44fc58fb4c

    • SHA1

      9bec3b1a0fcb3369d9635351455afc944a5d0530

    • SHA256

      caaac2649b57e658e83daff19e510575c9a53b8fc91dd55aefd278191d00f2dc

    • SHA512

      179e75701ed999fb92ea3d66d0cff2f3d3f825e77a3d351646d29707cefeb794fb13848037426aabfa3b3bf5a8a823f358f88b0ab43fd6f6a357b5bf03542cae

    • SSDEEP

      768:cFx0XaIsnPRIa4fwJMB5VD55pToHsKaGPEtdI:cf0Xvx3EMXT5p1KnPidI

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks