General

  • Target

    SWIFT Transfer 103 LD9081.doc

  • Size

    28KB

  • Sample

    230124-s6gncaea4x

  • MD5

    b46e00e44324f90a797dae714a4cc7d4

  • SHA1

    358154f88d48d0b09a1a0b2dd1b01c1d24c61642

  • SHA256

    b9ef91015d894ef785bbba54bd741d73866c7b5a4583ec87c470d748399f9ffd

  • SHA512

    414119d0b1c75813eb7da3c3a50ad703e992635ae7680a7b274fd794019e53bb762af9a0924ac92ce4bd5b28528d06c644eb7ac947880db500c2988b59cec1a1

  • SSDEEP

    768:VFx0XaIsnPRIa4fwJMCpDxpcQ2pxSGB/qd1CJs:Vf0Xvx3EMCGQyxoq+

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/cody/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SWIFT Transfer 103 LD9081.doc

    • Size

      28KB

    • MD5

      b46e00e44324f90a797dae714a4cc7d4

    • SHA1

      358154f88d48d0b09a1a0b2dd1b01c1d24c61642

    • SHA256

      b9ef91015d894ef785bbba54bd741d73866c7b5a4583ec87c470d748399f9ffd

    • SHA512

      414119d0b1c75813eb7da3c3a50ad703e992635ae7680a7b274fd794019e53bb762af9a0924ac92ce4bd5b28528d06c644eb7ac947880db500c2988b59cec1a1

    • SSDEEP

      768:VFx0XaIsnPRIa4fwJMCpDxpcQ2pxSGB/qd1CJs:Vf0Xvx3EMCGQyxoq+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks