General

  • Target

    2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81.rtf

  • Size

    87KB

  • Sample

    240724-btejsazeql

  • MD5

    29b3fc11ab9d647ec19d3e02364355b2

  • SHA1

    bcacc163004990d917d6402942e3e34609fa33e5

  • SHA256

    2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81

  • SHA512

    68752b58c102c4816859f4e06a9e676509ffba01cbe2772d5694e76da37f4dcdf74bd62d8ecaa33ed42f773693aaf135ad1b4bd940ae2277a7900f0105c57ba0

  • SSDEEP

    768:l5NZ+md7y9LGWjGT56kqg0PDvoszSzJpmSci/Dcohk:l5OpGWKT5Fx0LwFzJoSci/Nhk

Malware Config

Extracted

Family

lokibot

C2

http://overclockingmachines.info/bally/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81.rtf

    • Size

      87KB

    • MD5

      29b3fc11ab9d647ec19d3e02364355b2

    • SHA1

      bcacc163004990d917d6402942e3e34609fa33e5

    • SHA256

      2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81

    • SHA512

      68752b58c102c4816859f4e06a9e676509ffba01cbe2772d5694e76da37f4dcdf74bd62d8ecaa33ed42f773693aaf135ad1b4bd940ae2277a7900f0105c57ba0

    • SSDEEP

      768:l5NZ+md7y9LGWjGT56kqg0PDvoszSzJpmSci/Dcohk:l5OpGWKT5Fx0LwFzJoSci/Nhk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks