General

  • Target

    MV DOBROTA DOCS INSTRUCTIONS.xls

  • Size

    683KB

  • Sample

    230206-k964eada89

  • MD5

    e7fd9fc17216ee5b41867a90b6514813

  • SHA1

    a91392847605ea2dd4cabbb0b18c8a4689517798

  • SHA256

    36bfe471de8765f11de3ca3fce2a6a9b36d47ad8de09cc79b6648f09a653fd88

  • SHA512

    06367fdcaab3ba0290b67b343498fd74576d0f3341fc04747710b3448935e087c8e64c01d9937dc9c5f1ba295bd3db2f85ba691c4802534eab9b39504a0af72d

  • SSDEEP

    6144:U0rC6zzXaMANkizCBDEk2sG3figF8ESbuQD9cBmSI5Tj0rC6zzXaMANkizCBDEkq:t9L5Tb9T5TEwFSZDIlr

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/line/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      MV DOBROTA DOCS INSTRUCTIONS.xls

    • Size

      683KB

    • MD5

      e7fd9fc17216ee5b41867a90b6514813

    • SHA1

      a91392847605ea2dd4cabbb0b18c8a4689517798

    • SHA256

      36bfe471de8765f11de3ca3fce2a6a9b36d47ad8de09cc79b6648f09a653fd88

    • SHA512

      06367fdcaab3ba0290b67b343498fd74576d0f3341fc04747710b3448935e087c8e64c01d9937dc9c5f1ba295bd3db2f85ba691c4802534eab9b39504a0af72d

    • SSDEEP

      6144:U0rC6zzXaMANkizCBDEk2sG3figF8ESbuQD9cBmSI5Tj0rC6zzXaMANkizCBDEkq:t9L5Tb9T5TEwFSZDIlr

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks