General

  • Target

    _2201S_BUSAN_HOCHIMINH_.xlsx

  • Size

    187KB

  • Sample

    220210-gj7epsefh5

  • MD5

    cf8b307caa943326ee808bb3cb02deee

  • SHA1

    705c25adbdb7b805e47566540b3804eba178e7da

  • SHA256

    cbe84e2c523fd51dabb1365df50415ffc51f8159c36798061742f08ba5d31b9b

  • SHA512

    cfc3ae790c2e17051a4b03214baefd44eb30e8601bf8afd2d711cd197263854e96c19c2486a8838a1971607e09ad6728f6b9d8d982f6395b1ffc7d9c7eb599aa

Malware Config

Extracted

Family

lokibot

C2

http://asiaoil.bar//bobby/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      _2201S_BUSAN_HOCHIMINH_.xlsx

    • Size

      187KB

    • MD5

      cf8b307caa943326ee808bb3cb02deee

    • SHA1

      705c25adbdb7b805e47566540b3804eba178e7da

    • SHA256

      cbe84e2c523fd51dabb1365df50415ffc51f8159c36798061742f08ba5d31b9b

    • SHA512

      cfc3ae790c2e17051a4b03214baefd44eb30e8601bf8afd2d711cd197263854e96c19c2486a8838a1971607e09ad6728f6b9d8d982f6395b1ffc7d9c7eb599aa

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks