General

  • Target

    Confirmation.docx.exe

  • Size

    1.3MB

  • Sample

    240911-ml4dqavglq

  • MD5

    cc457c86d15ea18546d9065f5ca4ee04

  • SHA1

    66192064544af9b72ffd054ed8bde5aad95576c6

  • SHA256

    59640b32fd4e89cd138da35df35473a554da351660e7b654610642433135032c

  • SHA512

    0580495ce9856d5094cddd439fa2d4063b5e78d0d1af926259c45c72bda3ec357243c537474b8c8c390a8fe500de19ce2b3271896c779dccd0ccf980357f909a

  • SSDEEP

    24576:ypCC3MJPg7zsOTpKwM4LNPprrwr6HSJAXv0E65vYZv/UdW3seBdZwq:hbg/Nhrsr6HSJSME6VXWzBkq

Malware Config

Targets

    • Target

      Confirmation.docx.exe

    • Size

      1.3MB

    • MD5

      cc457c86d15ea18546d9065f5ca4ee04

    • SHA1

      66192064544af9b72ffd054ed8bde5aad95576c6

    • SHA256

      59640b32fd4e89cd138da35df35473a554da351660e7b654610642433135032c

    • SHA512

      0580495ce9856d5094cddd439fa2d4063b5e78d0d1af926259c45c72bda3ec357243c537474b8c8c390a8fe500de19ce2b3271896c779dccd0ccf980357f909a

    • SSDEEP

      24576:ypCC3MJPg7zsOTpKwM4LNPprrwr6HSJAXv0E65vYZv/UdW3seBdZwq:hbg/Nhrsr6HSJSME6VXWzBkq

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks