General

  • Target

    ihihihihihihihihihihihi###################ihihihihihiihihi.doc

  • Size

    22KB

  • Sample

    230606-qac9yaec41

  • MD5

    85475ae524d666b495d8829a391559a3

  • SHA1

    b38dc5814b8b25ca2b7072f5c9e9f5dbcb303bd3

  • SHA256

    2c92a73b2a1944edc54c6b9858aff4bea347c7ec32f28367dca613479ea77ca8

  • SHA512

    0944d414134651d09d19aac6e0f3eb88e694599cf02697ae464b0d88418fcec2847e53fb8c27c7bd5221c4b539feba9b4682903ac14df98cddc1923b40f77b8b

  • SSDEEP

    384:rBKimpXzcVhZH4pnxcsxJltKgKC3VBnB3+JM6hAYZRdKScbpm39w0Jo/F0jCixvS:VmpXzghZH4dxcsxhKJC3Vf3+dvSbpSon

Malware Config

Extracted

Family

lokibot

C2

http://194.180.48.58/morgan/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ihihihihihihihihihihihi###################ihihihihihiihihi.doc

    • Size

      22KB

    • MD5

      85475ae524d666b495d8829a391559a3

    • SHA1

      b38dc5814b8b25ca2b7072f5c9e9f5dbcb303bd3

    • SHA256

      2c92a73b2a1944edc54c6b9858aff4bea347c7ec32f28367dca613479ea77ca8

    • SHA512

      0944d414134651d09d19aac6e0f3eb88e694599cf02697ae464b0d88418fcec2847e53fb8c27c7bd5221c4b539feba9b4682903ac14df98cddc1923b40f77b8b

    • SSDEEP

      384:rBKimpXzcVhZH4pnxcsxJltKgKC3VBnB3+JM6hAYZRdKScbpm39w0Jo/F0jCixvS:VmpXzghZH4dxcsxhKJC3Vf3+dvSbpSon

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks