General

  • Target

    IN-066.doc

  • Size

    8KB

  • Sample

    230201-m7ebqaeh2v

  • MD5

    5d7f2446eead507f0b5477d8dd8a0a3f

  • SHA1

    ee29484d82ee67dfb6d221a5975264a4c0580222

  • SHA256

    14d6e05410e3b374b1d63ed82c5af8aec688563d56fd59f7851467ba2ef3548d

  • SHA512

    3b9a6a174da737441780c1ec42d4cc5354b43bceef5d0afffa180a5307226e7a594766ed2c0ea94f44878a81cde254870f1fff4d67c69972dea4889cba2cd5fe

  • SSDEEP

    96:ymEjR7UABGk8mn1jF9/aGv+0KF6+tlwdtOklO6LP6hO8uwmewEJmmXB:YjuVk8MT/t+0KFZwdLD/8bmuH

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/davidhill/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      IN-066.doc

    • Size

      8KB

    • MD5

      5d7f2446eead507f0b5477d8dd8a0a3f

    • SHA1

      ee29484d82ee67dfb6d221a5975264a4c0580222

    • SHA256

      14d6e05410e3b374b1d63ed82c5af8aec688563d56fd59f7851467ba2ef3548d

    • SHA512

      3b9a6a174da737441780c1ec42d4cc5354b43bceef5d0afffa180a5307226e7a594766ed2c0ea94f44878a81cde254870f1fff4d67c69972dea4889cba2cd5fe

    • SSDEEP

      96:ymEjR7UABGk8mn1jF9/aGv+0KF6+tlwdtOklO6LP6hO8uwmewEJmmXB:YjuVk8MT/t+0KFZwdLD/8bmuH

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks