General

  • Target

    0011INV-PBS-BPPXI22.xls

  • Size

    1.2MB

  • Sample

    230116-vqtzvaec31

  • MD5

    33a75ae52baa059c946ce63343977318

  • SHA1

    3f9a8c9b845e25c823236f55e803261611b7ada1

  • SHA256

    ee87371ff74c24235fb99de41971f23185587ee25030fe4abf0a6142101cfb6e

  • SHA512

    3dfff19d8d8eb90400773272e7e40095b299b8040e9f3b324a26e176f01929a934ce049c48544a268fa1418a8878f0863e888e69e0e9e3c8c5f7d43e2fe21c33

  • SSDEEP

    24576:YZyg5mMZyu1m35QsTYh2TDXXXXXXXXXXXXUXXXXXXXXXX7XXXXXCK8VIvsSXOJv6:KbQDTXK8xSeJvb

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      0011INV-PBS-BPPXI22.xls

    • Size

      1.2MB

    • MD5

      33a75ae52baa059c946ce63343977318

    • SHA1

      3f9a8c9b845e25c823236f55e803261611b7ada1

    • SHA256

      ee87371ff74c24235fb99de41971f23185587ee25030fe4abf0a6142101cfb6e

    • SHA512

      3dfff19d8d8eb90400773272e7e40095b299b8040e9f3b324a26e176f01929a934ce049c48544a268fa1418a8878f0863e888e69e0e9e3c8c5f7d43e2fe21c33

    • SSDEEP

      24576:YZyg5mMZyu1m35QsTYh2TDXXXXXXXXXXXXUXXXXXXXXXX7XXXXXCK8VIvsSXOJv6:KbQDTXK8xSeJvb

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks