General

  • Target

    Shipping document EXP4052 MAERSK AMAZON.xls

  • Size

    179KB

  • Sample

    230120-yd39jahf22

  • MD5

    3624d3c88fb16885c58cb4be303a54ee

  • SHA1

    cad95da7ce88a90c77c23970c587c873c9ae0d4c

  • SHA256

    3a1d7aaae74c5112c684b9c10390f922cf52ba8df28c4cf71206e7fb373c3de3

  • SHA512

    bacdf21154cb34fac8d0185f9d8ad361183991c51bf5b1ed8e5f6c9f36ccff4bd995bec2008506433e69b8caa32651aed7e77fbe2eda73659905684e4cd19005

  • SSDEEP

    3072:Kt9hcuh4t9hcNrhGTDfZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAADB+5IeW0iT2fB:IcuhicNNGXZ+RwPONXoRjDhIcp0fDlaO

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/line/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Shipping document EXP4052 MAERSK AMAZON.xls

    • Size

      179KB

    • MD5

      3624d3c88fb16885c58cb4be303a54ee

    • SHA1

      cad95da7ce88a90c77c23970c587c873c9ae0d4c

    • SHA256

      3a1d7aaae74c5112c684b9c10390f922cf52ba8df28c4cf71206e7fb373c3de3

    • SHA512

      bacdf21154cb34fac8d0185f9d8ad361183991c51bf5b1ed8e5f6c9f36ccff4bd995bec2008506433e69b8caa32651aed7e77fbe2eda73659905684e4cd19005

    • SSDEEP

      3072:Kt9hcuh4t9hcNrhGTDfZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAADB+5IeW0iT2fB:IcuhicNNGXZ+RwPONXoRjDhIcp0fDlaO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks