General

  • Target

    statement of Dec 2022.xls

  • Size

    184KB

  • Sample

    230120-ezapkafe9v

  • MD5

    11755fd7597fe1225eee8f2a91b02f72

  • SHA1

    e76614f8b9d2da386f0e45664c769792e6a6101c

  • SHA256

    263485c2c9e4da2fa483d9bf845262fe0faebaf19ffc2c9b8fe5b3e86bea1c67

  • SHA512

    9b7fe6e0e2aef976022074231261593276a0a8d0e61a779362a98e5197c5e152bf7ffc3da2fb850ed221544aae17a3a34f4e5c20a146a47ca03e060777ffcd6e

  • SSDEEP

    3072:dt9hc1mt9hcuNfZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAnkheagLYvOHBIkt1Lf1:Tc10cuNZ+RwPONXoRjDhIcp0fDlavx+E

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      statement of Dec 2022.xls

    • Size

      184KB

    • MD5

      11755fd7597fe1225eee8f2a91b02f72

    • SHA1

      e76614f8b9d2da386f0e45664c769792e6a6101c

    • SHA256

      263485c2c9e4da2fa483d9bf845262fe0faebaf19ffc2c9b8fe5b3e86bea1c67

    • SHA512

      9b7fe6e0e2aef976022074231261593276a0a8d0e61a779362a98e5197c5e152bf7ffc3da2fb850ed221544aae17a3a34f4e5c20a146a47ca03e060777ffcd6e

    • SSDEEP

      3072:dt9hc1mt9hcuNfZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAnkheagLYvOHBIkt1Lf1:Tc10cuNZ+RwPONXoRjDhIcp0fDlavx+E

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks