General

  • Target

    SecuriteInfo.com.Exploit.MathType-Obfs.Gen.3602.23049.xlsx

  • Size

    185KB

  • Sample

    230120-cx1f4adc3w

  • MD5

    0ec2ce77939bd3cad837bddbdd235d45

  • SHA1

    c270e3388e9b099a352132280f83f35cd1415233

  • SHA256

    17187faff069ea4e8a0c9f2d7bea8ac65126e2bfdd2054aa19c8c8f63fa7e007

  • SHA512

    05c494083d8fc8ce21d527feaf020fa6942d2e9d5151586ad98fb181d83ea4383c58954cab961c509a052008c8f5da6a2be4e20320f19ccb5e005dda3956fa2e

  • SSDEEP

    3072:Ht9hc16t9hcuK7fZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAT9TadAxrt9xFOujrHB:hc1YcuKzZ+RwPONXoRjDhIcp0fDlavxk

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SecuriteInfo.com.Exploit.MathType-Obfs.Gen.3602.23049.xlsx

    • Size

      185KB

    • MD5

      0ec2ce77939bd3cad837bddbdd235d45

    • SHA1

      c270e3388e9b099a352132280f83f35cd1415233

    • SHA256

      17187faff069ea4e8a0c9f2d7bea8ac65126e2bfdd2054aa19c8c8f63fa7e007

    • SHA512

      05c494083d8fc8ce21d527feaf020fa6942d2e9d5151586ad98fb181d83ea4383c58954cab961c509a052008c8f5da6a2be4e20320f19ccb5e005dda3956fa2e

    • SSDEEP

      3072:Ht9hc16t9hcuK7fZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAT9TadAxrt9xFOujrHB:hc1YcuKzZ+RwPONXoRjDhIcp0fDlavxk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks