General

  • Target

    SecuriteInfo.com.W32.MSIL_Agent.IGJ.gen.Eldorado.22518.20282.exe

  • Size

    672KB

  • Sample

    240627-qwsxhstele

  • MD5

    e4979c53302e30f656edf76043b5944a

  • SHA1

    0da3297c718121717f9379d6bb27a1c236060c18

  • SHA256

    3b253bddd8e49b0353b44254fdc82c53c1614f5c2d09e2fde95698ad3a7815a0

  • SHA512

    e21cb87346a76614d11ed5dc090a3c98dfa56c6c151bf99be6de5c8bc00f0ecd1481b0993f77886812a88af89ce0bc98a918fbd1572e244470f571799ed08891

  • SSDEEP

    12288:nT3mljcpsnIyn5AyFGdWj8uVD7PmFpz7bYJPRaBYDHovmmEHt9NbuBU2ZE8xmOmu:TCooX5A3WtF+F9WZHSmFS

Malware Config

Extracted

Family

lokibot

C2

http://midwestsoil.top/alpha/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SecuriteInfo.com.W32.MSIL_Agent.IGJ.gen.Eldorado.22518.20282.exe

    • Size

      672KB

    • MD5

      e4979c53302e30f656edf76043b5944a

    • SHA1

      0da3297c718121717f9379d6bb27a1c236060c18

    • SHA256

      3b253bddd8e49b0353b44254fdc82c53c1614f5c2d09e2fde95698ad3a7815a0

    • SHA512

      e21cb87346a76614d11ed5dc090a3c98dfa56c6c151bf99be6de5c8bc00f0ecd1481b0993f77886812a88af89ce0bc98a918fbd1572e244470f571799ed08891

    • SSDEEP

      12288:nT3mljcpsnIyn5AyFGdWj8uVD7PmFpz7bYJPRaBYDHovmmEHt9NbuBU2ZE8xmOmu:TCooX5A3WtF+F9WZHSmFS

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks