General

  • Target

    3cb0e7646266b60650aa554f75bd9c0b.bin

  • Size

    1.0MB

  • Sample

    240515-cs9h7sdb44

  • MD5

    3cb0e7646266b60650aa554f75bd9c0b

  • SHA1

    c018d025eb56c4fe7fdd19b2e2169c85f7da55a8

  • SHA256

    796faee4e99839d1dd11e7bc1205e67cd89fe31bb6fa6ab2743310868935f671

  • SHA512

    f275b38d8e019ff79e4d42f91449ed14707dcd373f6c158ac61ae70d0038baf70680decc4656c3b7dd9e22fd9c6b9e2ed3ff4967c2a5a7948dfc49825c836fa7

  • SSDEEP

    24576:rmoO8itEqfZgX7kwa6chgOr00MNFe32UkqD/XDuH+D:qvZ+a6BOKFe32UkC+O

Malware Config

Extracted

Family

lokibot

C2

http://fiftint.com/v-2/pin.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      3cb0e7646266b60650aa554f75bd9c0b.bin

    • Size

      1.0MB

    • MD5

      3cb0e7646266b60650aa554f75bd9c0b

    • SHA1

      c018d025eb56c4fe7fdd19b2e2169c85f7da55a8

    • SHA256

      796faee4e99839d1dd11e7bc1205e67cd89fe31bb6fa6ab2743310868935f671

    • SHA512

      f275b38d8e019ff79e4d42f91449ed14707dcd373f6c158ac61ae70d0038baf70680decc4656c3b7dd9e22fd9c6b9e2ed3ff4967c2a5a7948dfc49825c836fa7

    • SSDEEP

      24576:rmoO8itEqfZgX7kwa6chgOr00MNFe32UkqD/XDuH+D:qvZ+a6BOKFe32UkC+O

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader First Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks