General

  • Target

    2.docx

  • Size

    10KB

  • Sample

    230202-nscd9aga33

  • MD5

    964435a9422be8e9212752151d6e2045

  • SHA1

    7bf1fa0295f31caca8f93b986e1980764695683b

  • SHA256

    b9cd7f34e5260b2002c3b3514c8756e4f211fa5a8cdad2c107b90131996605e7

  • SHA512

    86e8e259e4244210201502a0da6e7bacd730b9e92f21dc2ab07328a4148bcf9af383610aac0089e431558efe5e7dc32d3775aebdb6a9d509a35dab06f930a2ee

  • SSDEEP

    192:ScIMmtP5hG/b7XN+eOUeO+5+5F7Jar/YEChI3uN:SPXRE7XtOUe7wtar/YECO+

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://dgd0000fghfjf000ghf0000hfghgfhf0000ghfgsdgfgg00000dfgdfgert0000000dfgdfgdfg@3235032958/3.doc

Extracted

Family

lokibot

C2

https://sempersim.su/ha4/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2.docx

    • Size

      10KB

    • MD5

      964435a9422be8e9212752151d6e2045

    • SHA1

      7bf1fa0295f31caca8f93b986e1980764695683b

    • SHA256

      b9cd7f34e5260b2002c3b3514c8756e4f211fa5a8cdad2c107b90131996605e7

    • SHA512

      86e8e259e4244210201502a0da6e7bacd730b9e92f21dc2ab07328a4148bcf9af383610aac0089e431558efe5e7dc32d3775aebdb6a9d509a35dab06f930a2ee

    • SSDEEP

      192:ScIMmtP5hG/b7XN+eOUeO+5+5F7Jar/YEChI3uN:SPXRE7XtOUe7wtar/YECO+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks