General

  • Target

    533ec2002e6dcf5cc585823bacd4647a1fb83758993ba716be76f24c0a2fa2ae.zip

  • Size

    7KB

  • Sample

    230208-ly8crsab49

  • MD5

    5729e3fa88f81662f1abe463045b3ea6

  • SHA1

    0ddf0742cddcc6870b9d9df4630e49ee65b98948

  • SHA256

    c2086058502d0cfaf13a240feccd047fb8dd996086bd6cf1b253f2d196cb7567

  • SHA512

    ad28e3a64a82870ce95894cff0a227df1d13d3b78a195055d85d6099a5b04f85687aed782933dd371534dc1a56d5fa595a39e0ba4ff00e8cb7a330e6e76f2b2b

  • SSDEEP

    192:GJOsHbet/HEpgpB4Ny3Coyiz9bpPRbFYjh6I6W:qO6e/HEnNALhtY96dW

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://dgdfg00000000hfjf0000000ghfghfgh000000gfhfg0000hfgsdgfggd0000fgdfge00000rtdfgd00000fg00dfg@3221479282/78.doc

Extracted

Family

lokibot

C2

https://sempersim.su/ha1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      533ec2002e6dcf5cc585823bacd4647a1fb83758993ba716be76f24c0a2fa2ae.doc

    • Size

      10KB

    • MD5

      d07eb11e2f72bde21377460c4eaebfa4

    • SHA1

      729b4f7d337e88ea40c0d417bd2808f275de733e

    • SHA256

      533ec2002e6dcf5cc585823bacd4647a1fb83758993ba716be76f24c0a2fa2ae

    • SHA512

      7a0f0fdecbdc2a8c9b78791b776c95d9a58fb857be65bc0d57b28508eab0080a44f0a16e0d1114e7b2146705186376dbffef22bc0a4ef918ae51c2087db2b66a

    • SSDEEP

      192:ScIMmtP5hG/b7XN+eO/xXkO+5+5F7Jar/YEChI3UqR:SPXRE7XtOJXk7wtar/YECOUe

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks