General

  • Target

    SWU5109523I.7z.zip

  • Size

    888KB

  • Sample

    240625-qtjk3awbjq

  • MD5

    36284d227825c61d94b0b0ae6984d94c

  • SHA1

    b74f9df6926ec26227026a0e346edf7bee2d23a7

  • SHA256

    6628f1123f4f18db8b6e612037714c9b0e314a495df027b2ba99aa9dfe87a71e

  • SHA512

    c66d53d9fabb69b6caaea9db3c33602e4794b76101e49aeb7db8d28cf4405b8a38b711ca35f935b5c1c0fb2fca13da50fb938e6bbf232c1d5dbdea355037f725

  • SSDEEP

    24576:q2tWnF9Afgt3r39IMH0Dg9LRM5u8lVdNfRwxLw:1gJbCe00Lqnd3wxLw

Malware Config

Extracted

Family

lokibot

C2

http://sssteell-com.pro/kedu/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SWU5109523I.exe

    • Size

      1.8MB

    • MD5

      1af02455b4d35d282469dde4144cbd07

    • SHA1

      bcd8d182b9d8036ce3b31c4fac14cb1d074e45ff

    • SHA256

      2407da1627f35dafc162c06c93c95d612ac0349488241d297152e41d0f8af7a0

    • SHA512

      9ab046b3c20985290f155e07441ea97ac84bc064b8f237b2883cb65280bcf9f0b174924e8e20eb22be5b10693b20be02bdaa3ab4f9e9e79c71ded6f031af8c0a

    • SSDEEP

      49152:mOD+bTI6YTDml4HJPHDQkOBU0f9iygcrxZ3aU5ZdIrRo2ht1K1YvkUw:rv85

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Adds policy Run key to start application

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Collection

Email Collection

1
T1114

Tasks