General

  • Target

    ARRIVAL NOTICE.doc

  • Size

    155KB

  • Sample

    240521-qlacesfd4s

  • MD5

    f0b81727aaae72dd97b0420c46427ac2

  • SHA1

    ae2806f7a923214a0e82f7a788f14a269a236315

  • SHA256

    309fa7a49ec515910ccb0d8432e1bcc2bb7d9f8c252230177236e0a028488377

  • SHA512

    c2c5ecc676b37699b23145b76b86628e5a61f810b8122917781d7112b56e58440a148b441e1bf28d083f33be59764a3106984a88a50410a0f034610743a2284b

  • SSDEEP

    1536:ywAlRkwAlRkwAlRkwAlRwA96EHr0iQZpfNE:ywAlawAlawAlawAl6A96XiQDfNE

Malware Config

Extracted

Family

lokibot

C2

http://spencerstuartllc.top/evie2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ARRIVAL NOTICE.doc

    • Size

      155KB

    • MD5

      f0b81727aaae72dd97b0420c46427ac2

    • SHA1

      ae2806f7a923214a0e82f7a788f14a269a236315

    • SHA256

      309fa7a49ec515910ccb0d8432e1bcc2bb7d9f8c252230177236e0a028488377

    • SHA512

      c2c5ecc676b37699b23145b76b86628e5a61f810b8122917781d7112b56e58440a148b441e1bf28d083f33be59764a3106984a88a50410a0f034610743a2284b

    • SSDEEP

      1536:ywAlRkwAlRkwAlRkwAlRwA96EHr0iQZpfNE:ywAlawAlawAlawAl6A96XiQDfNE

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks