{"id":1332,"date":"2024-09-22T19:50:41","date_gmt":"2024-09-22T19:50:41","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1332"},"modified":"2025-07-29T07:31:10","modified_gmt":"2025-07-29T07:31:10","slug":"analysis-of-lokibot-campaign","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-lokibot-campaign\/","title":{"rendered":"Analysis of Lokibot Campaign"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"979\" height=\"519\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-6-1.webp\" alt=\"\" class=\"wp-image-1336\"\/><\/figure>\n\n\n\n<p>LokiBot, alternatively referred to as Loki or Lokibot, is a form of malicious software (malware) categorized as a banking trojan and information stealer. It specifically targets Windows-based systems and is primarily utilized to illicitly obtain sensitive information, with a particular focus on capturing banking credentials, login details, and other personal data.<\/p>\n\n\n\n<p><strong>Programming Language:<\/strong> Lokibot is primarily written in C++. The use of C++ allows the malware to be efficient, and it is a common language for developing Windows-based malware.<\/p>\n\n\n\n<p><strong>Lokibot Evolution:<\/strong> Lokibot has undergone several iterations and updates over the years. Like many malware strains, it has adapted to changes in cybersecurity defenses, evolving its techniques to avoid detection and improve its capabilities.<\/p>\n\n\n\n<p><strong>Distribution of Lokibot:<\/strong> The malware is often distributed through phishing campaigns.<\/p>\n\n\n\n<p>Example: Guloader distributing the following malware variants namely,<\/p>\n\n\n\n<p>Nanocore RAT<\/p>\n\n\n\n<p>Remcos RAT<\/p>\n\n\n\n<p>Agent Tesla<\/p>\n\n\n\n<p>Lokibot<\/p>\n\n\n\n<p>xLoader<\/p>\n\n\n\n<p>Netwire<\/p>\n\n\n\n<p>Initially GuLoader samples were able to get past detection by traditional antivirus software, but advanced security solutions eventually proved capable of detecting this malware.&nbsp; However, the GuLoader developers proceeded to improve their product in parallel with the continual development of antivirus software by cyber security OEMs. Cybercriminals have been known to employ various social engineering tactics, such as malicious emails with attachments or links with or without evasion shellcode, to trick users to click on the links and infect their systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Infection Chain:<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"979\" height=\"408\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-4.webp\" alt=\"\" class=\"wp-image-1333\"\/><\/figure>\n\n\n\n<p>Target &#8211; Windows Platform<\/p>\n\n\n\n<p>Infection Vector \u2013 Malicious spam campaigns and\/or phishing emails.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Characteristics &amp; Functionality of Lokibot<\/strong><\/h2>\n\n\n\n<p>Information Theft: Lokibot is primarily designed to steal sensitive information such as login credentials, usernames, passwords, and other financial data. It often targets online banking and other financial services.<\/p>\n\n\n\n<p>Keylogging: One of Lokibot&#8217;s main functionalities is keylogging, which involves recording keystrokes made by the user. This helps the malware capture login credentials and other sensitive information entered by the user.<\/p>\n\n\n\n<p>Data Exfiltration: Once Lokibot collects the targeted information, it can send this data to a remote server controlled by the attackers. This allows cybercriminals to access and use the stolen information for fraudulent activities.<\/p>\n\n\n\n<p>Persistence: Lokibot is known for its ability to maintain persistence on infected systems, ensuring that it remains active and continues to steal information over an extended period.<\/p>\n\n\n\n<p>Evolution: Like many malware strains, Lokibot undergoes changes and updates to avoid detection by security software. It may be distributed through various means, such as phishing emails, malicious websites, or infected attachments. Command and Control (C2) Servers: Lokibot communicates with remote servers controlled by cybercriminals to receive commands, updates, and to transmit stolen data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Sample Information:<\/strong><\/h3>\n\n\n\n<p>Threat Name: LokiBot | Classification: Downloader<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"979\" height=\"206\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-5.webp\" alt=\"\" class=\"wp-image-1334\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Technical Analysis of LokiBot Malware:<\/strong><\/h2>\n\n\n\n<p>This campaign typically begins with the distribution of spam emails. These emails often contain content in various languages, which can confuse users and prompt them to enable the macro content in the attached document in order to view it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-6-1.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Phishing Email Template<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"502\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-6-1-1.webp\" alt=\"\" class=\"wp-image-1337\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Macro enabled content<\/p>\n\n\n\n<p><strong>VBA Macro_Modules:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"637\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-6-2.webp\" alt=\"\" class=\"wp-image-1338\"\/><\/figure>\n\n\n\n<p><strong>VBA Specialfolders:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"485\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-6-3.webp\" alt=\"\" class=\"wp-image-1339\"\/><\/figure>\n\n\n\n<p><strong>Char Encoding Technique:<\/strong><\/p>\n\n\n\n<p>Character encoding is a method in computing that translates characters and symbols into binary data, assigning a specific binary code to each character for storage and transmission.<\/p>\n\n\n\n<p>ASCII, UTF-8, and UTF-16 are well-known character encoding schemes, each with its capacity to represent diverse character sets, including various languages and special symbols. Character encoding plays a crucial role in text processing, communication, and ensuring cross-system and cross-language compatibility.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"456\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-6-4.webp\" alt=\"\" class=\"wp-image-1340\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Char Encoding Technique<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"396\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-6-5.webp\" alt=\"\" class=\"wp-image-1341\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Obfuscated URL<\/p>\n\n\n\n<p>Malware authors leverage VBA special folders in Excel for persistent execution, evading security detection, gaining trust, exploiting user interactions, and facilitating the spread of malicious macros.<\/p>\n\n\n\n<p><strong>Obtained Obfuscated URL:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"215\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-6-6.webp\" alt=\"\" class=\"wp-image-1342\"\/><\/figure>\n\n\n\n<p><strong>Indicator of Compromise:<\/strong><\/p>\n\n\n\n<p>Indicators of Compromise (IoCs) are like clues in cybersecurity. They help expert\u2019s spot signs of a possible security problem, allowing them to investigate and fix issues related to cyber threats.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"210\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-7.webp\" alt=\"\" class=\"wp-image-1343\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Complete URL &gt; Payload EXE downloader<\/p>\n\n\n\n<p>The submitted URL domain IP has been blacklisted, indicating that it is a harmful website that hosts malicious payload files.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"210\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-8.webp\" alt=\"\" class=\"wp-image-1344\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Main Domain &gt; IP Blacklisted<\/p>\n\n\n\n<p><strong>MITRE ATT&amp;CK Tactics &amp; Techniques for Lokibot VBA variant:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>ID<\/td><td>Tactic<\/td><td>Technique<\/td><\/tr><tr><td>TA0001<\/td><td>Initial Access<\/td><td>Spam Email Phishing Attachment<\/td><\/tr><tr><td>TA0002<\/td><td>Execution<\/td><td>Windows Scripting &#8211; XLS VBA Macro Codes<\/td><\/tr><tr><td>TA0003<\/td><td>Persistence<\/td><td>Modify Registry Log-on Initialization Scripts<\/td><\/tr><tr><td>TA0004<\/td><td>Privilege Escalation<\/td><td>Scheduled Task \/ Job<\/td><\/tr><tr><td>TA0005<\/td><td>Defense Evasion<\/td><td>Virtualization and Sandbox Evasion Technique Obfuscated file or Information<\/td><\/tr><tr><td>TA0006<\/td><td>Credential Access<\/td><td>OS Credential Dumping LSASS Memory Input Capture<\/td><\/tr><tr><td>TA0007 &nbsp; TA0008<\/td><td>Discovery &nbsp; Lateral Movement<\/td><td>System Software Discovery Process Discovery File and Directory Discovery Query Registry &nbsp; &nbsp; Remote file copy<\/td><\/tr><tr><td>TA0009<\/td><td>Collection<\/td><td>Credential API Hooking Archive Collected &nbsp;&nbsp;Data &nbsp; Data from Local System<\/td><\/tr><tr><td>TA0011<\/td><td>C&amp;C Server &nbsp;<\/td><td>Encrypted Channels Web Protocols &#8211; Standard Application Layer Protocol &nbsp;Ingress Tool Transfer<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>LokiBot, alternatively referred to as Loki or Lokibot, is a form of malicious software (malware) categorized as a banking trojan and information stealer. It specifically targets Windows-based systems and is primarily utilized to illicitly obtain sensitive information, with a particular focus on capturing banking credentials, login details, and other personal data. Programming Language: Lokibot is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1336,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1332"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1332\/revisions"}],"predecessor-version":[{"id":4427,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1332\/revisions\/4427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1336"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}