General

  • Target

    Shippment Swift Copy_PDF.rar

  • Size

    259KB

  • Sample

    230207-h41y4aaa73

  • MD5

    1e758bfd9c8b1833a0d39d3e875ebf3e

  • SHA1

    197adb9cb3dfb4c11e12116a1dba5f20609d552d

  • SHA256

    8edab3d9b5bc81b5ef374f427a2dac801ada0d6fbd0b913b6908ece1ce7768ac

  • SHA512

    02e1883588bc2d676583384a700239ba73bca84c2159403b0377be987d7516389727a32f51e449ec165c0c63c4a7dd253e69ab5455505475a431591a146e1eb5

  • SSDEEP

    6144:3QWuEr4yF8VOfMYq8SCwjaQeDjCiNFI+ndUNoASNq:AWuEkR3sra9Cnp5w

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha12/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Shippment Swift Copy.exe

    • Size

      344KB

    • MD5

      8ed4cf27c1633d3c25e6980f5ee8d8fa

    • SHA1

      10565a5953569a1657afa4873401e2d8e8940f2b

    • SHA256

      a3c7d60f19310f7dbecce1acba480a79cc7d7839aed4467bdd3eb374bfcd68eb

    • SHA512

      4296e8bb86e2b6cfbedc8fe856bd66956cf1a6688ba1d19d9ccaae5544f62daf866329ab35bf20d541e7a161b21163c4f61346828cc923138ce4509a98447a7d

    • SSDEEP

      6144:8Ya6O4eRhQ9sVnQxU1vg8eE9N43l6lE/Ml6yZq0Shc8PGzAZ:8Y1eRh3nWUJg8eE99l6Uq0Shc/zC

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks