Analysis

  • max time kernel
    128s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2023 18:04

General

  • Target

    82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe

  • Size

    182KB

  • MD5

    3c201fc4355b967aefaae295cc6fa701

  • SHA1

    4ad41361158e353f97245fab6cc4a428ecb3412b

  • SHA256

    82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6

  • SHA512

    074ee95baf1ac1f655c3cdfa05f01d484f09db33c3b833b286607ef4190ed5af654f124e150a10c3a4a26f198ee7da06b2d991b6112b55c37c10554e6526bea1

  • SSDEEP

    3072:HfY/TU9fE9PEtuVbaQ0J5VhItJ/g30rXufhkiz1mWGf3VIYydK0QPWWBT3QAU49p:/Ya6r10JJOY0Lu1mWipy0PLHFp

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe
    "C:\Users\Admin\AppData\Local\Temp\82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Users\Admin\AppData\Local\Temp\hfmvin.exe
      "C:\Users\Admin\AppData\Local\Temp\hfmvin.exe" C:\Users\Admin\AppData\Local\Temp\zdyquvojou.slv
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Local\Temp\hfmvin.exe
        "C:\Users\Admin\AppData\Local\Temp\hfmvin.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2032

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hfmvin.exe
    Filesize

    79KB

    MD5

    1569e2caf69f69a661e4014b56bd41f2

    SHA1

    502bbadd27b4adac65b1d2f89a6bd66243d8355d

    SHA256

    e5b821c028ae135e40ec3e9d7400ef514131b8fff75767fb619896d3acef8f04

    SHA512

    1c23c1c7e288b9046ec3fc342f81c5cdb54bdfac34b70ce30a9cef27472d11f6cc1886f0033fc954da174651365100c6a17c7aca9e69fdc8e4de778ded6da6e9

  • C:\Users\Admin\AppData\Local\Temp\hfmvin.exe
    Filesize

    79KB

    MD5

    1569e2caf69f69a661e4014b56bd41f2

    SHA1

    502bbadd27b4adac65b1d2f89a6bd66243d8355d

    SHA256

    e5b821c028ae135e40ec3e9d7400ef514131b8fff75767fb619896d3acef8f04

    SHA512

    1c23c1c7e288b9046ec3fc342f81c5cdb54bdfac34b70ce30a9cef27472d11f6cc1886f0033fc954da174651365100c6a17c7aca9e69fdc8e4de778ded6da6e9

  • C:\Users\Admin\AppData\Local\Temp\hfmvin.exe
    Filesize

    79KB

    MD5

    1569e2caf69f69a661e4014b56bd41f2

    SHA1

    502bbadd27b4adac65b1d2f89a6bd66243d8355d

    SHA256

    e5b821c028ae135e40ec3e9d7400ef514131b8fff75767fb619896d3acef8f04

    SHA512

    1c23c1c7e288b9046ec3fc342f81c5cdb54bdfac34b70ce30a9cef27472d11f6cc1886f0033fc954da174651365100c6a17c7aca9e69fdc8e4de778ded6da6e9

  • C:\Users\Admin\AppData\Local\Temp\kliasrh.oi
    Filesize

    124KB

    MD5

    dece2960f5f43f6bb2708f5477de37b2

    SHA1

    83eda7f8e8add4d690014d8d39f0cac6113c941d

    SHA256

    1c8a98b4d2b5fac5c844cf9de4b5c083d5699ebf7e1fd50b0c63562076c461db

    SHA512

    3d63f4c711b0d56e460c9a85c5c300a20dd66c69f88e0ec0fe378f13b582eb8efeadaf57f9fc396be3886468ba1ce48e25e6381432138ffb0638d5f622352e47

  • C:\Users\Admin\AppData\Local\Temp\zdyquvojou.slv
    Filesize

    5KB

    MD5

    ca798aba91e0b1a9b2940c395562a34c

    SHA1

    14bd11f6f57efb1b417608f43b1d7d4a9397dbcc

    SHA256

    7d01de0741445c8caccff77a58c667298d2e291f391dfbda2931f265f08e7a83

    SHA512

    0018b934f0fc36cc52556d1254512fc3b345ebcd4eb66964850eea76d0e676e4d87bdb53bbcf90d04c9bf5b4c9c586e6fd012ebe3f9f8c3821738fdaa6ed9732

  • memory/2032-137-0x0000000000000000-mapping.dmp
  • memory/2032-139-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/2032-140-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/4464-132-0x0000000000000000-mapping.dmp