General

  • Target

    REMITTANCE ADVICE [REF0000360261].xls

  • Size

    1.0MB

  • Sample

    230209-aake9abe56

  • MD5

    9440bad2a57747bf88aa508e26485ddc

  • SHA1

    a3242607f6570536eafda3b6f4d3f30da560e2f5

  • SHA256

    83b5e2491136b593198de29997b791e88e7d5a3e6472caae44902191e6266e52

  • SHA512

    1fd31386fad6eedbffe869a05552741a9bacbb237e8ca5e66b8c309320011925fc7a7ec57cf27df38b3d3535e8ca3e8e85510d262605c104166f57dac8dd79ce

  • SSDEEP

    24576:bFefqLFRIcBFe3MdGoo5ncQVSyjAcZDek:5lpzGEtQV9fll

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha13/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      REMITTANCE ADVICE [REF0000360261].xls

    • Size

      1.0MB

    • MD5

      9440bad2a57747bf88aa508e26485ddc

    • SHA1

      a3242607f6570536eafda3b6f4d3f30da560e2f5

    • SHA256

      83b5e2491136b593198de29997b791e88e7d5a3e6472caae44902191e6266e52

    • SHA512

      1fd31386fad6eedbffe869a05552741a9bacbb237e8ca5e66b8c309320011925fc7a7ec57cf27df38b3d3535e8ca3e8e85510d262605c104166f57dac8dd79ce

    • SSDEEP

      24576:bFefqLFRIcBFe3MdGoo5ncQVSyjAcZDek:5lpzGEtQV9fll

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks