General

  • Target

    22052024_1253_22052024_Obaveštenje o prilivu.PDF.zip

  • Size

    499KB

  • Sample

    240522-p4l89scb4v

  • MD5

    b2628944f8e1a2e3598bbd45c19bebc8

  • SHA1

    21cb684a903dbde5f477be607d97e21aca7fb796

  • SHA256

    1d1e907474549d2c1cf2dae83b5fc49b4f22778e0354107268d3d201c0e5c901

  • SHA512

    4c1c6045a6d8072c7705942715f292eae678146178af5be7a82e3750a041aff14d75eb5feaee5e2fae8befbc92d456b40a8d3b9b4589460ce083ac91c3b04314

  • SSDEEP

    12288:xgbELUh0WgZbs0CYYRegv/M1Kx5BPKYcbzvepr:xjQqWgB5yj01I5BPKvbrY

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/3b1tenbkyj

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Extracted

Family

formbook

Version

4.1

Campaign

dn03

Decoy

almouranipainting.com

cataloguia.shop

zaparielectric.com

whcqsc.com

ioco.in

aduredmond.com

vavada611a.fun

humtivers.com

jewellerytml.com

mcapitalparticipacoes.com

inhlcq.shop

solanamall.xyz

moviepropgroup.com

thegenesis.ltd

cyberxdefend.com

skinbykoco.com

entermintlead.com

honestaireviews.com

wyclhj7gqfustzp.buzz

w937xb.com

Targets

    • Target

      Obavestenje o prilivu.PDF.exe

    • Size

      524KB

    • MD5

      3911e099bed114b7417378e2dbe079d1

    • SHA1

      00fea996bbff2b686a0b3e275d536babacefc0af

    • SHA256

      e9e09c2f8031763a0c8494d500bd28ca3adc87d5f700111255db99f8142f2933

    • SHA512

      55630fbf32fb702185fbc3f6adee9f5775e6e91c0c1bf9e448d7506ebed15852970946d856d9dd399f0b12da3f0a97a05c6c2803a4546e8a034e8f89eeb3694b

    • SSDEEP

      12288:7EELYhiWgZlgyCGYRe6v/M1Kx5pPKYcfzvw:oEskWgDDyb01I5pPKvfr

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks