General

  • Target

    SecuriteInfo.com.Exploit.CVE-2018-0798.4.8545.29627.rtf

  • Size

    610KB

  • Sample

    240809-twza3ssfrl

  • MD5

    5f04749efc3d57d3a4d63e28d44eb4d9

  • SHA1

    e1bb4bec5b967adc72e2c6c35d906c264a5e679c

  • SHA256

    27427a904391653fff86cc4d9a3c54645b932556bf1c14c65dbacebbbcf159f2

  • SHA512

    668bd8222bc71b6e153711a5507f9c671e6f9c2a07014feda63c397f9acfbbc242d7983cd82418d9dc340ff0e22ec683de803fd18340fa18426ebf284278ffda

  • SSDEEP

    6144:xwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAq:IL

Malware Config

Extracted

Family

lokibot

C2

http://104.248.205.66/index.php/wp?s=831

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SecuriteInfo.com.Exploit.CVE-2018-0798.4.8545.29627.rtf

    • Size

      610KB

    • MD5

      5f04749efc3d57d3a4d63e28d44eb4d9

    • SHA1

      e1bb4bec5b967adc72e2c6c35d906c264a5e679c

    • SHA256

      27427a904391653fff86cc4d9a3c54645b932556bf1c14c65dbacebbbcf159f2

    • SHA512

      668bd8222bc71b6e153711a5507f9c671e6f9c2a07014feda63c397f9acfbbc242d7983cd82418d9dc340ff0e22ec683de803fd18340fa18426ebf284278ffda

    • SSDEEP

      6144:xwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAq:IL

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks