ExecuteMalware

2021-02-17 Lokibot IOCs

Feb 17th, 2021
4,685
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.36 KB | None | 0 0
  1. THREAT ATTRIBUTION: LOKIBOT / AVE MARIA?
  2.  
  3. ANALYST NOTES
  4. I thought that the combination of a cutt.ly forward to download an .exe is usually indicative of Ave Maria.
  5. However, the C2 traffic out to fre.php is clearly Lokibot.
  6.  
  7. SUBJECTS OBSERVED
  8. Statement for month-end Jan 2021 T/T payment
  9.  
  10. SENDERS OBSERVED
  11.  
  12. MALDOC FILE HASHES
  13. Payment list.xlsx
  14. 010f2db66f5ffec899d9990e3316b37c
  15. McAfee=Y
  16.  
  17. Statement.xlsx
  18. 010f2db66f5ffec899d9990e3316b37c
  19. McAfee=Y
  20.  
  21. LOKIBOT PAYLOAD URLS
  22. https://cutt.ly/0kLb8eI
  23. http://kungsb2stdygotchtstf.dns.army/kung2doc/winlog.exe
  24.  
  25. LOKIBOT PAYLOAD FILE HASHES
  26. winlog.exe
  27. 8cc9a32f8cf03de89a1a9235ae206cd0
  28.  
  29. It's renamed and moved here:
  30. C:\users\analyst\AppData\Roaming\17E4D9
  31. 97071E.exe
  32. 8cc9a32f8cf03de89a1a9235ae206cd0
  33.  
  34. LOKIBOT C2
  35. http://becharnise.ir/fb3/fre.php
  36.  
  37. ADDITIONAL FILES
  38. I also found the following - I don't know if they're malicious:
  39.  
  40. C:\users\analyst\AppData\Local\Temp
  41. 76v7xb.dll
  42. 43b77e01a8b6f3af6500fe732941f66d
  43.  
  44. C:\users\analyst\AppData\Local\Temp\nsdEED6.tmp
  45. System.dll
  46. fccff8cb7a1067e23fd2e2b63971a8e1
  47.  
  48. From Virustotal:
  49. "This is the System.dll file component of Nullsoft Scriptable Install System Portable v3.06.1 (nsis-3.06.1)
  50. Malware may had utilized it for a bad purpose."
  51.  
  52. SUPPORTING EVIDENCE
  53. https://app.any.run/tasks/d071d34e-b9d2-440e-be70-7b24d6ae3bec/
  54.  
Advertisement
Add Comment
Please, Sign In to add comment