General

  • Target

    PO DTL20-041.doc

  • Size

    400KB

  • Sample

    240513-kc2gnaec7x

  • MD5

    e334ed30eb161cd9517431ee26f7df69

  • SHA1

    ad0799b76832939a37d223b25da870773659ff2e

  • SHA256

    c73fded08a7501a542f197617a30f30ce307fd5190a9f8778478b8ba2586de5b

  • SHA512

    3cb096459103041e882b7933159e9145c42d36136489ce61a093ddd8fb208f7199a6fc6635afa1086c6626680cdf913dcc1e2416f93f8aa46bada8c81097c927

  • SSDEEP

    6144:8wAYwAYwAYwAYwAYwAYwAYwAYwAYwAa/LABMZSw:ZC

Malware Config

Extracted

Family

lokibot

C2

http://spencerstuartllc.top/evie2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO DTL20-041.doc

    • Size

      400KB

    • MD5

      e334ed30eb161cd9517431ee26f7df69

    • SHA1

      ad0799b76832939a37d223b25da870773659ff2e

    • SHA256

      c73fded08a7501a542f197617a30f30ce307fd5190a9f8778478b8ba2586de5b

    • SHA512

      3cb096459103041e882b7933159e9145c42d36136489ce61a093ddd8fb208f7199a6fc6635afa1086c6626680cdf913dcc1e2416f93f8aa46bada8c81097c927

    • SSDEEP

      6144:8wAYwAYwAYwAYwAYwAYwAYwAYwAYwAa/LABMZSw:ZC

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks