General

  • Target

    attachment.action

  • Size

    29KB

  • Sample

    230124-23qlhsfg4z

  • MD5

    1197511565a3205683e8b670e09c5522

  • SHA1

    6755a21726763347299f6ec0d545460b71c779c9

  • SHA256

    80c28ca3134acd26d2f0181fe9866129103a3ea94e49929442506d404aced261

  • SHA512

    77e9c616b4a6abbfecafb60b591f0f18b82a7dc738bdb7dce050df1ddf643e1aad7c6af3981996eedbbdec1d1ba6ffe2a5ae5a50947bd30885c15d5efb4db5fd

  • SSDEEP

    768:IFx0XaIsnPRIa4fwJMKeP5chQrEieJB6i1yzLOeiSgapgH:If0Xvx3EMK/0feJBQzaePgOgH

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      attachment.action

    • Size

      29KB

    • MD5

      1197511565a3205683e8b670e09c5522

    • SHA1

      6755a21726763347299f6ec0d545460b71c779c9

    • SHA256

      80c28ca3134acd26d2f0181fe9866129103a3ea94e49929442506d404aced261

    • SHA512

      77e9c616b4a6abbfecafb60b591f0f18b82a7dc738bdb7dce050df1ddf643e1aad7c6af3981996eedbbdec1d1ba6ffe2a5ae5a50947bd30885c15d5efb4db5fd

    • SSDEEP

      768:IFx0XaIsnPRIa4fwJMKeP5chQrEieJB6i1yzLOeiSgapgH:If0Xvx3EMK/0feJBQzaePgOgH

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks