{"id":2014,"date":"2024-09-25T10:39:16","date_gmt":"2024-09-25T10:39:16","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2014"},"modified":"2025-07-29T03:14:33","modified_gmt":"2025-07-29T03:14:33","slug":"analysis-of-vbs-lokibot-campaign","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-vbs-lokibot-campaign\/","title":{"rendered":"Analysis of VBS LokiBot Campaign"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"294\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-lokibot2-1024x294-1.webp\" alt=\"\" class=\"wp-image-2112\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Distribution of LokiBot<\/strong><\/h3>\n\n\n\n<p>This article introduces the latest wave of VBS LokiBot campaign, and it&#8217;s subsequent analysis by LMNTRIX. One of the most prevalent malware families that the LMNTRIX CDC has recently seen is called LokiBot. It targets hundreds of computer programs installed on the compromised system, including commonly used web browsers, email clients, and FTP servers, in order to steal sensitive information from the target like usernames, passwords, and cryptocurrency wallets.<\/p>\n\n\n\n<p>Our technical analysis suggests that it was likely produced in one of the former USSR states (Russia, Ukraine, Kazakhstan, Tajikistan, and Belarus). The LokiBot malware&#8217;s most recent samples are propagated through malspam campaigns that encourage recipients to download infected file attachments. It is frequently used to spread the infection through a wide range of methods, including sharing Microsoft Office documents or script files that are designed to download and install additional malware payloads, including archive files containing an ISO file or a LokiBot executable.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Infection Chain<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"417\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen1-1024x417-1.webp\" alt=\"\" class=\"wp-image-2015\"\/><\/figure>\n\n\n\n<p>Lokibot infects its victims by initial infection vectors of spam emails. This kind of email file gets delivered in password-protected archives, which contains a JavaScript file. Usually, these .JS files are embedded with malicious URL to download the payload file, likewise it uses known infection from [tgcXXX.XXXX] domain in-order to download the payload files.<\/p>\n\n\n\n<p>The initial vectors may vary depending on the individual threat actor and their targets, we all know that the threat actors will perform basic reconnaissance, when he targets a certain geography prior to choosing the infection vector.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Sample Information<\/strong><\/p>\n\n\n\n<p>SHA256: 0a08857b3b6b52510c544f54f8b7489038e371a85db858ad3c34c4f7198da819<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"350\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen2-1024x350-1.webp\" alt=\"\" class=\"wp-image-2016\"\/><\/figure>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Technical Analysis of Lokibot VBS Campaign<\/strong><\/h3>\n\n\n\n<p>VBS (Virtual Basic Script) file is an interpreted scripting language which contains code that can be executed within Windows or Internet Explorer, via the Windows-based script host (Wscript.exe), to perform certain admin and processing functions. Visual Basic for Applications (VBA) code can be included as a part of the file header and footer properties (Left-Header, Center-Header, Right-Header, Left-Footer, Center-Footer, and Right-Footer). This is very helpful for an analyst when analyzing any script file \/ script based malware.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Snap 1: Header Content<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"435\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen3-1024x435-1.webp\" alt=\"\" class=\"wp-image-2017\"\/><\/figure>\n\n\n\n<p>Our sample contains a header content of dotted element. With these tricks, can we analyze the sample adequately?? Probably not. The malware author dupes the target to believe there\u2019s no hidden content inside the file. Let\u2019s examine the footer content of our sample and, then we can start our analysis.<\/p>\n\n\n\n<p><strong>Snap 2: Footer Content<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"473\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen4-1024x473-1.webp\" alt=\"\" class=\"wp-image-2018\"\/><\/figure>\n\n\n\n<p>Snapshot shown above was taken from the sample&#8217;s footer content. This section also contains the dotted elements (padding). Does it mean it&#8217;s a legitimate file?? &nbsp;<\/p>\n\n\n\n<p>The&nbsp;embedded content&nbsp;was&nbsp;really&nbsp;deftly&nbsp;placed&nbsp;in&nbsp;the&nbsp;centre&nbsp;of&nbsp;the&nbsp;file&nbsp;by&nbsp;the&nbsp;malware&nbsp;author, the main reason is to facilitate AV evasion, or to avoid being detected by the AV vendors. Just observe the header&#8217;s starting line and ending line, almost 2000 lines, the author chooses to pad the centre of the file with dotted lines to hide the malicious content.<\/p>\n\n\n\n<p><strong>Snap 3: Middle content<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"462\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen5-1024x462-1.webp\" alt=\"\" class=\"wp-image-2019\"\/><\/figure>\n\n\n\n<p><strong>Snap 4: Embedded Content<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"463\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen6-1024x463-1.webp\" alt=\"\" class=\"wp-image-2020\"\/><\/figure>\n\n\n\n<p>From the snapshot seen above, we can observe a function inside the file is obfuscated. Upon additional analysis, we should be able to predict &amp; replace the content exactly.<\/p>\n\n\n\n<p><strong>Snap 5: Embedded Content with URL<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"439\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen7-1024x439-1.webp\" alt=\"\" class=\"wp-image-2021\"\/><\/figure>\n\n\n\n<p>With further analysis, LMNTRIX CDC is able to predict the multi-part URL, and it\u2019s declared functions.The URL is split into smaller parts and rejoined to avoid detection, another manoeuvre in every modern malware author&#8217;s bag of tricks. Using the destination URL, it will download the payload file and store it in the Windows&#8217; %AppData% folder.<\/p>\n\n\n\n<p><strong>Snap 6: Threat Identifiers<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"363\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen8-1024x363-1.webp\" alt=\"\" class=\"wp-image-2022\"\/><\/figure>\n\n\n\n<p><strong>Snap 7: Initial &#8211; Indicator of Compromised [IOC]<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"121\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Lokivbs_Screen9-1024x121-1.webp\" alt=\"\" class=\"wp-image-2023\"\/><\/figure>\n\n\n\n<p>It\u2019s the common IOC of Loki-Bot, where it\u2019s used for a long period. Using this URL it will connect with the threat actor&#8217;s C2 server.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Once the system is infected, Lokibot will perform the following actions:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collecting information about the compromised host.<\/li>\n\n\n\n<li>Password stealing (from browser history and cookies).<\/li>\n\n\n\n<li>Targeting web banking links (web injects).<\/li>\n\n\n\n<li>Password brute forcing.<\/li>\n\n\n\n<li>Registry manipulation (persistence).<\/li>\n\n\n\n<li>Replicating its copies.<\/li>\n\n\n\n<li>Process injection to conceal the malicious action.<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Appendix A \u2013 LokiBot Components<\/strong><\/p>\n\n\n\n<p>These are possibly the files (file artefacts) hidden within the Windows %APPDATA% directory at any given point in time. LMNTRIX has outlined the functions of the files dropped by Loki Bot campaign,&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File Extension<\/td><td>File Description<\/td><\/tr><tr><td>.exe<\/td><td>An executable copy of the malware that will execute each&nbsp;the user account is logged into<\/td><\/tr><tr><td>.hdb<\/td><td>Database of hashes for data that has already been exfiltrated to threat actor\u2019s C2 server<\/td><\/tr><tr><td>.kdb<\/td><td>Database of keylogging data that has yet to be sent to the C2 server<\/td><\/tr><tr><td>.lck<\/td><td>A lock file created when either decrypting windows credentials, or, keylogging to prevent resource conflicts on Windows<\/td><\/tr><tr><td>.vbs<\/td><td>Staged shellcode or, malicious loader to execute functions of the Lokibot campaign<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Appendix B \u2013 Indicators of Compromise for LokiBot<\/strong><\/p>\n\n\n\n<p><strong>IP Address<\/strong><\/p>\n\n\n\n<p>210[.]245[.]8[.]133<br>212[.]1[.]211[.]48<br>172[.]67[.]179[.]121<br>23[.]253[.]46[.]64<br>31[.]170[.]160[.]61<br>74[.]208[.]236[.]199<br>162[.]241[.]3[.]30<br>172[.]67[.]206[.]17<br>204[.]93[.]178[.]31<br>216[.]10[.]240[.]90<br>103[.]26[.]43[.]131<br>78[.]128[.]76[.]165<br>212[.]108[.]234[.]94<br>172[.]67[.]214[.]235<br>104[.]18[.]39[.]232<br>50[.]31[.]174[.]86<br>77[.]222[.]62[.]31<br>104[.]18[.]32[.]77<br>172[.]67[.]204[.]22<br>103[.]199[.]16[.]121<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Hashes Observed<\/strong><\/p>\n\n\n\n<p>E9E14BAF4ADF6E1D45016C79EC09B7E5A36E1DEE272E1F335F96CE7CDFED127A<\/p>\n\n\n\n<p>51F462CFFF7CCE2803C70069E302A86C66F43CEC35602171A4752A997013CA87<\/p>\n\n\n\n<p>442730F6CF2A2FF1D7CA9E286F5BDCF99689CAE3C8B959F9B1DBBDDD6839F78A<\/p>\n\n\n\n<p>52431707738F4962E6D465B66C5A8D56D36B0EDBCBC268002BC56C6F4B40A4D2<\/p>\n\n\n\n<p>958595E2B49E0042FC6888D3CD008DCA5FD38BC79CD7574DD5031B27171ED811<\/p>\n\n\n\n<p>A822B982EF431F0A6813EF38DD672151C786AADB71C0787F8419BD04B127A44D<\/p>\n\n\n\n<p>DA65AEE4D8D8B4F979AB4176C9E69347E06187EF59C03914F278859ACADFF45A<\/p>\n\n\n\n<p>AE4AD82FDBD7BE97E93A92555320E683EA177DE299F4A882411D652B464837F7<\/p>\n\n\n\n<p>D361D688E58FAFB99967AFC805BD203C1F743A113B8C76C7E94B2960F40B285D<\/p>\n\n\n\n<p>D072A28D28A7498F48B82D55BE214F4808F18EAEB1CBD6E414BD131CB507FC04<\/p>\n\n\n\n<p>0D3E3B77F530D1D4AE4ABC3AC74283EA6E6FF41784A14447E925EE88E6D057C5<\/p>\n\n\n\n<p>77C100C1960321C3FA9BE5157FB9F9E21D9C0AB60D1106DF819E431516462CE4<\/p>\n\n\n\n<p>107B6B206140ED200F6440F30077C53ED7DB2447C04CDE954C52437962EA0FCB<\/p>\n\n\n\n<p>050A053B4F14B010CFC82949BB761C209D1B4A8E98675E1E13FE072EF942B246<\/p>\n\n\n\n<p>839119DE734C39B0C2F3C1391AED1F9F5BC6BD162DF9194743CF3EC6AF90BEF8<\/p>\n\n\n\n<p>F172723AA5C023E6D22BDBBFA8DE48679C694AF6EAF6156142BABF4913F520CE<\/p>\n\n\n\n<p>542219BA546FB9770B914CBC0F7FA117C1CF3FC2F8C4D58165E4884328196ABA<\/p>\n\n\n\n<p>E4D40B456C9DA36ED8516C0B5A77819368020F6D386ED8955814CA77FFF5F58A<\/p>\n\n\n\n<p>73B13CEA2C234CE674DAE5666BC66FE01BA387283672CCF2684735A1B8C9A643<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Domains<\/strong><\/p>\n\n\n\n<p>data[.]jsdelivr[.]com<br>secureanalytic[.]com<br>ww1[.]tsx[.]org<br>ww1[.]virustoal[.]com<br>majul[.]com<br>css[.]developmyredflag[.]top<br>www[.]downloadnetcat[.]com<br>cdn[.]intedia[.]de<br>cdn[.]siteswithcontent[.]com<br>mail[.]tecniagro[.]net<br>kucukkoybutik[.]com<br>makemyroster[.]com<br>guose[.]intsungroup[.]com<br>app-a[.]customericare[.]com<br>mail[.]forumsboard[.]com<br>www[.]sgstockexpert[.]com<br>pnpboxes[.]com<br>wolneatomy[.]com<br>smtp[.]standardsintered[.]com<br>www[.]harbygazete[.]com<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>MITRE ATT&amp;CK Mapping for Loki Bot<\/strong><\/h3>\n\n\n\n<p>According to MITRE, the Loki Bot uses the following, tools tactics and procedures,<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><td><strong>Tactics\/Techniques (TTP)<\/strong><\/td><td><strong>Malware Function<\/strong><\/td><\/tr><\/thead><tbody><tr><td><em>System Network Configuration Discovery<\/em> [T1016]<\/td><td>LokiBot has the ability to discover the domain name of the infected host.<\/td><\/tr><tr><td><em>Obfuscated Files or Information<\/em> [T1027]<\/td><td>LokiBot has encoded strings with base64 encoding.<\/td><\/tr><tr><td><em>Obfuscated Files or Information: Software Packing<\/em> [T1027.002]<\/td><td>LokiBot has used several packing methods for obfuscation.<\/td><\/tr><tr><td><em>System Owner\/User Discovery<\/em> [T1033]<\/td><td>LokiBot has the ability to discover the system information and username on the infected host.<\/td><\/tr><tr><td><em>Exfiltration Over C2 Channel<\/em> [T1041]<\/td><td>LokiBot has the ability to initiate contact with command and control to exfiltrate stolen data.<\/td><\/tr><tr><td><em>Process Injection: Process Hollowing<\/em> [T1055.012]<\/td><td>LokiBot has used process hollowing to inject into legitimate Windows process vbc.exe.<\/td><\/tr><tr><td><em>Input Capture: Keylogging<\/em> [T1056.001]<\/td><td>LokiBot has the ability to capture input on the compromised host via keylogging.<\/td><\/tr><tr><td><em>Application Layer Protocol: Web Protocols <\/em>[T1071.001]<\/td><td>LokiBot has used Hypertext Transfer Protocol for command and control.<\/td><\/tr><tr><td><em>System Information Discovery<\/em> [T1082]<\/td><td>LokiBot has the ability to discover the computer name and Windows product name\/version.<\/td><\/tr><tr><td><em>User Execution: Malicious File<\/em> [T1204.002]<\/td><td>LokiBot has been executed through malicious documents contained in spear phishing email.<\/td><\/tr><tr><td><em>Credentials from Password Stores<\/em> [T1555]<\/td><td>LokiBot has stolen credentials from multiple applications and data sources including Windows operating system credentials, email clients, File Transfer Protocol, and Secure File Transfer Protocol clients.<\/td><\/tr><tr><td><em>Credentials from Password Stores: Credentials from Web Browsers<\/em> [T1555.003]<\/td><td>LokiBot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and Chromium and Mozilla Firefox-based web browsers.<\/td><\/tr><tr><td><em>Hide Artifacts: Hidden Files and Directories<\/em> [T1564.001]<\/td><td>LokiBot has the ability to copy itself to a hidden file and directory.<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Distribution of LokiBot This article introduces the latest wave of VBS LokiBot campaign, and it&rsquo;s subsequent analysis by LMNTRIX. One of the most prevalent malware families that the LMNTRIX CDC has recently seen is called LokiBot. It targets hundreds of computer programs installed on the compromised system, including commonly used web browsers, email clients, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2112,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2014","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2014"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2014\/revisions"}],"predecessor-version":[{"id":4186,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2014\/revisions\/4186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2112"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}