General

  • Target

    Statement Of Account .xls

  • Size

    883KB

  • Sample

    230118-q89e2aac62

  • MD5

    7b35fd3ea67e7ab049ba760c0bbf03e7

  • SHA1

    e0e3665311627b00580f3ff72c502e6e3779afd2

  • SHA256

    2fe07388d4fb59ade682b9553b4fee971d77a18018cbe7af052d880c2211c559

  • SHA512

    bdd45fb16e63d5eca8e957a057e272abddcc0be5326f729c6c260617f1a6128d5dd085625e35f59eef6bb681feb1eabb7ad564409c2a55ced7db3ebc455ce0b2

  • SSDEEP

    12288:Us02NM0ry+1wFZBDF4BSFLBJFKBsx02NM0ry+1ZFTBHFxBaFJBiFBBnuoSIAB1WP:KZy6Z9lsZyrX4ILSIAvQv

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Statement Of Account .xls

    • Size

      883KB

    • MD5

      7b35fd3ea67e7ab049ba760c0bbf03e7

    • SHA1

      e0e3665311627b00580f3ff72c502e6e3779afd2

    • SHA256

      2fe07388d4fb59ade682b9553b4fee971d77a18018cbe7af052d880c2211c559

    • SHA512

      bdd45fb16e63d5eca8e957a057e272abddcc0be5326f729c6c260617f1a6128d5dd085625e35f59eef6bb681feb1eabb7ad564409c2a55ced7db3ebc455ce0b2

    • SSDEEP

      12288:Us02NM0ry+1wFZBDF4BSFLBJFKBsx02NM0ry+1ZFTBHFxBaFJBiFBBnuoSIAB1WP:KZy6Z9lsZyrX4ILSIAvQv

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks