General

  • Target

    31889820ee1563f02c415ba07e2220b0_NeikiAnalytics.exe

  • Size

    619KB

  • Sample

    240523-t3tdeahc2s

  • MD5

    31889820ee1563f02c415ba07e2220b0

  • SHA1

    5f49d38935524040e6222897077c6393e1d14a43

  • SHA256

    e05c517fb4a915b142200ca5dfe2e69fd579a2ffbfbcafc2b4d478163d407b09

  • SHA512

    1340bcd80292531773da8bd766ab579c2ee96c6df0258775a8e61dd252a7c823afd26e56615c0835cb1073f7f21b4319967a456c076bd004b84fa2bdcca50810

  • SSDEEP

    12288:0IqWET/mr9K+22BEEzFatnPvEOwWkIai6YpgnNMuskRBqdQV3i:4Wtb3BEV8OwWklPYyNMy0QZ

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/3b1tenbkyj

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      31889820ee1563f02c415ba07e2220b0_NeikiAnalytics.exe

    • Size

      619KB

    • MD5

      31889820ee1563f02c415ba07e2220b0

    • SHA1

      5f49d38935524040e6222897077c6393e1d14a43

    • SHA256

      e05c517fb4a915b142200ca5dfe2e69fd579a2ffbfbcafc2b4d478163d407b09

    • SHA512

      1340bcd80292531773da8bd766ab579c2ee96c6df0258775a8e61dd252a7c823afd26e56615c0835cb1073f7f21b4319967a456c076bd004b84fa2bdcca50810

    • SSDEEP

      12288:0IqWET/mr9K+22BEEzFatnPvEOwWkIai6YpgnNMuskRBqdQV3i:4Wtb3BEV8OwWklPYyNMy0QZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks