{"id":2136,"date":"2024-09-25T11:51:28","date_gmt":"2024-09-25T11:51:28","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2136"},"modified":"2025-07-29T03:21:43","modified_gmt":"2025-07-29T03:21:43","slug":"technical-analysis-loki-bot-malware-campaign","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/technical-analysis-loki-bot-malware-campaign\/","title":{"rendered":"Technical Analysis &#8211; Loki Bot Malware Campaign"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"612\" height=\"484\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/lokibot1-1.webp\" alt=\"lokibot-from-russia\" class=\"wp-image-2150\"\/><figcaption class=\"wp-element-caption\">lokibot-from-russia<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>LokiBot was first advertised and it originated in underground forums in 2015 as an information stealer and keylogging software. Since then, it has added various capabilities and affected many people globally. Lokibot was deployed as a botnet initially, in which a number of compromised systems infected with the malware communicate with command-and-control (C&amp;C) servers in order to send stolen data and receive commands from the C2 Server.<\/p>\n\n\n\n<p>Lokibot was developed in PHP, it can be hosted in React JS like framework, with additional code in C++ and C#. Lokibot is a complex and very technical piece of malware, with Base64 encoded strings and 3DES Encryption employed for code obfuscation, forming 3 layers of packed malware code, and it exploits known memory corruption vulnerability with CVE-2017-11882.<\/p>\n\n\n\n<p>LokiBot is perceived to be an information stealer, but it\u2019s a hybrid Android and Windows infection-capable malware that steals credentials, logs keystrokes from the most widely used web browsers, FTP, and email clients. It also doubles up as a Banking Trojan that can launch drive by attacks, steal information, mine cryptocurrency, act as a ransomware and has advanced features such as UAC bypass to get past Windows 7, Windows 8 and Windows 10 if the user denies administrative rights to the malware.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"345\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/lokibot-infchain-1024x345-1.webp\" alt=\"\" class=\"wp-image-2149\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Infection Chain:<\/h3>\n\n\n\n<p>Here, the exploit arrives as a spear-phishing email attachment. This kind of email contains Microsoft office word documents (.docx) which is in archives file format. It contains a simple purchase order Invoice attachment; this kind of exploit doesn&#8217;t require enabling the macros. Once the user opens the document, it will connect to the target URL to download its subsequent vector such as RTF, LNK files etc., then those files communicate with the payload to perform the malicious actions.<br><br>Sample Information<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"294\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/lokibot2-1024x294-1.webp\" alt=\"\" class=\"wp-image-2151\"\/><\/figure>\n\n\n\n<p><br><\/p>\n\n\n\n<p>Sample 1: Phishing Email Content<br>EML: 4f9d48eaa3daae385fc39ce9d3618b61938e184f016a3b821136a97f51463a26<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"513\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-sample1-1024x513-1.webp\" alt=\"\" class=\"wp-image-2137\"\/><\/figure>\n\n\n\n<p>Here, the malware author very cleverly used a well-known technique to spam a victim by simply sending an invoice payment. Mainly there\u2019s no sense of urgency, just an invoice attachment. What will the users normally do? They simply open the attached document to view the invoice message. This is one of the common evasion techniques used to proliferate spam emails.<br><br>Sample 2: Attached DOCX<br>DOCX: 891bf02c653413c9ec80bb4dc0c5922472dac82020efbe6bd15dfdfa19c9911a<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"492\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-sample2-1024x492-1.webp\" alt=\"\" class=\"wp-image-2138\"\/><\/figure>\n\n\n\n<p>Here, there\u2019s not much content inside the document. Simply, enable editing content in-order to enable the macro functions.<br><br><strong>Enable-Editing<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-sample3-1024x489-1.webp\" alt=\"\" class=\"wp-image-2139\"\/><\/figure>\n\n\n\n<p>Once editing is enabled, the targeted URL inside the websetting.xml will trigger to perform the malicious actions.<\/p>\n\n\n\n<p><strong>Structure of the DOCX file:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"427\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-structuredocx-1024x427-1.webp\" alt=\"\" class=\"wp-image-2140\"\/><\/figure>\n\n\n\n<p>XML has a variety of uses in the sectors like Web, e-business, and mobile applications. Few XML-based Languages include XHTML, RSS, SMIL, WSDL, WAP, and SOAP. XML files are used to develop database-driven types. Due to their Flexibility, they could transfer data without missing descriptive information among corporate databases. So, this takes advantage for the malware author to target its victim\u2019s system easily.<\/p>\n\n\n\n<p><strong>websettings.xml<\/strong> &gt; It&#8217;s a web page setting, which specifies the set of web page settings including the root element, that have been specified for a single Word-processing XML document.<br><br><strong>Target URL:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"297\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-loki-target-url-1024x297-1.webp\" alt=\"\" class=\"wp-image-2141\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"85\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-loki-ip-short1-1024x85-1.webp\" alt=\"\" class=\"wp-image-2142\"\/><\/figure>\n\n\n\n<p>Here, we can see the word HTTP followed by random numbers?? No, it\u2019s a not a normal number, rather it&#8217;s an IP address, the author tricked the user to believe that the source is a legitimate one.<br><br>Technique: They just used the IP Shortener to hide their malicious IP address.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Initial &#8211; Indicator of Compromise [IOC]:<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"297\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-loki-iochex-1024x297-1.webp\" alt=\"\" class=\"wp-image-2143\"\/><\/figure>\n\n\n\n<p><strong>Dropper File:<br><\/strong>Once the file is executed, then it will create an internet shortcut file, and which will call the targeted URL.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"99\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-loki-dropper-1024x99-1.webp\" alt=\"\" class=\"wp-image-2144\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p>Generally, Internet Shortcut files are used to create shortcuts on your computer to Internet websites. They are like normal shortcut files, but while shortcut files are links to files stored locally on your computer, Internet shortcut files point to a file or resource that exists at a remote location accessible through the Internet.<\/p>\n\n\n\n<p><strong>Sample 3: RAR Archive<\/strong><br>18cf375e022d0eec7a05b243a1e884318180a20f7d1479668be900b058280381<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"771\" height=\"589\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-loki-rar-sample.webp\" alt=\"\" class=\"wp-image-2145\"\/><\/figure>\n\n\n\n<p>Inside the RAR file, we can see there\u2019s a payload file &#8211; Contract Inquiry[.]exe<\/p>\n\n\n\n<p><strong>Sample 4: Payload file [.EXE]<br><\/strong>107b6b206140ed200f6440f30077c53ed7db2447c04cde954c52437962ea0fcb<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"430\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-lokipayload1-1024x430-1.webp\" alt=\"\" class=\"wp-image-2146\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"196\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13-lokipayload2-1024x196-1.webp\" alt=\"\" class=\"wp-image-2147\"\/><\/figure>\n\n\n\n<p>The file has base64 encoded strings and 3DES cryptography for code obfuscation and its functionality is provided in details as part of the MITRE ATT&amp;CK mapping.&nbsp; It uses HTTP protocol to communicate with the C2 server.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"214\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/14-loki-vendor-flag-1024x214-1.webp\" alt=\"\" class=\"wp-image-2148\"\/><\/figure>\n\n\n\n<p><strong>Once infected, the following actions are carried out by the Loki Bot malware;<\/strong><\/p>\n\n\n\n<p>Collect system fingerprint information and sends it to C2 server,<br>Checks for debugger evasion, and executes the malware,<br>Creates hidden files, links, and directories, (Eg: %AppData% folder)<br>Sample tries to set the executable flag,<br>Executes commands using a shell command line interpreter,<br>File and Directory Permissions Modification.<br>Then, depending on if the current user is privileged, the virus sets persistence either under HKEY_LOCAL_MACHINE or KEY_CURRENT_USER,<br>For persistence, the keylogger then applies the 3DES encryption technique to the URL and the registry key;<br>After this, the virus starts waiting for commands from C2 server, creating a new thread to detect the C2 server\u2019s response.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Mitigations for Loki Bot<\/strong><\/h3>\n\n\n\n<p>LMNTRIX recommends that federal, state government, and private sector users to apply the following best practices to strengthen the security posture of your organization&#8217;s systems. System owners and administrators should review, document and schedule configuration changes with a risk matrix prior to implementation to avoid irreversible damage.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Maintain up-to-date antivirus signatures and engines. Consider using an EDR solution.<\/li>\n\n\n\n<li>Keep operating system patches up to date.<\/li>\n\n\n\n<li>Disable file and printer sharing services, unless they are absolutely necessary. If these services are necessary, please use strong passwords to&nbsp;&nbsp;&nbsp;&nbsp; secure these services.<\/li>\n\n\n\n<li>Enforce multi-factor authentication through a token, or mobile implementation.<\/li>\n\n\n\n<li>Restrict user&#8217;s privilege to install and run unwanted software applications.\n<ol class=\"wp-block-list\">\n<li>Do not add users to the local administrator group unless required.<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li>Exercise caution when opening email attachments, even if the attachment is expected, and the sender appears to be known.<\/li>\n\n\n\n<li>Disable unnecessary services on your workstations and servers.<\/li>\n\n\n\n<li>Exercise caution when using removable storage media (USB pen drives, external drives, CDs\/DVDs).<\/li>\n\n\n\n<li>Scan all software downloaded from the internet prior to executing.<\/li>\n\n\n\n<li>Maintain situational awareness of the latest threats and implement appropriate security controls to restrict access.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>IOC \u2013 Indicators of Compromise for Detecting Loki Bot<\/strong><\/h3>\n\n\n\n<p><strong>IP Address<\/strong><\/p>\n\n\n\n<p>210.245.8.133<br>212.1.211.48<br>172.67.179.121<br>23.253.46.64<br>31.170.160.61<br>74.208.236.199<br>162.241.3.30<br>172.67.206.17<br>204.93.178.31<br>216.10.240.90<br>103.26.43.131<br>78.128.76.165<br>212.108.234.94<br>172.67.214.235<br>104.18.39.232<br>50.31.174.86<br>77.222.62.31<br>104.18.32.77<br>172.67.204.22<br>103.199.16.121<\/p>\n\n\n\n<p><strong>Hashes Observed<\/strong><\/p>\n\n\n\n<p>E9E14BAF4ADF6E1D45016C79EC09B7E5A36E1DEE272E1F335F96CE7CDFED127A<br>51F462CFFF7CCE2803C70069E302A86C66F43CEC35602171A4752A997013CA87<br>442730F6CF2A2FF1D7CA9E286F5BDCF99689CAE3C8B959F9B1DBBDDD6839F78A<br>52431707738F4962E6D465B66C5A8D56D36B0EDBCBC268002BC56C6F4B40A4D2<br>958595E2B49E0042FC6888D3CD008DCA5FD38BC79CD7574DD5031B27171ED811<br>A822B982EF431F0A6813EF38DD672151C786AADB71C0787F8419BD04B127A44D<br>DA65AEE4D8D8B4F979AB4176C9E69347E06187EF59C03914F278859ACADFF45A<br>AE4AD82FDBD7BE97E93A92555320E683EA177DE299F4A882411D652B464837F7<br>D361D688E58FAFB99967AFC805BD203C1F743A113B8C76C7E94B2960F40B285D<br>D072A28D28A7498F48B82D55BE214F4808F18EAEB1CBD6E414BD131CB507FC04<br>0D3E3B77F530D1D4AE4ABC3AC74283EA6E6FF41784A14447E925EE88E6D057C5<br>77C100C1960321C3FA9BE5157FB9F9E21D9C0AB60D1106DF819E431516462CE4<br>107B6B206140ED200F6440F30077C53ED7DB2447C04CDE954C52437962EA0FCB<br>050A053B4F14B010CFC82949BB761C209D1B4A8E98675E1E13FE072EF942B246<br>839119DE734C39B0C2F3C1391AED1F9F5BC6BD162DF9194743CF3EC6AF90BEF8<br>F172723AA5C023E6D22BDBBFA8DE48679C694AF6EAF6156142BABF4913F520CE<br>542219BA546FB9770B914CBC0F7FA117C1CF3FC2F8C4D58165E4884328196ABA<br>E4D40B456C9DA36ED8516C0B5A77819368020F6D386ED8955814CA77FFF5F58A<br>73B13CEA2C234CE674DAE5666BC66FE01BA387283672CCF2684735A1B8C9A643<\/p>\n\n\n\n<p><strong>Domains<br><\/strong>data.jsdelivr.com<br>secureanalytic.com<br>ww1.tsx.org<br>ww1.virustoal.com<br>majul.com<br>css.developmyredflag.top<br>www.downloadnetcat.com<br>cdn.intedia.de<br>cdn.siteswithcontent.com<br>mail.tecniagro.net<br>kucukkoybutik.com<br>makemyroster.com<br>guose.intsungroup.com<br>app-a.customericare.com<br>mail.forumsboard.com<br>www.sgstockexpert.com<br>pnpboxes.com<br>wolneatomy.com<br>smtp.standardsintered.com<br>harbygazete.com<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>MITRE ATT&amp;CK Mapping for Loki Bot<\/strong><\/h2>\n\n\n\n<p>According to MITRE, the Loki Bot uses the following, tools tactics and procedures,<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><td><strong>Tactics\/Techniques (TTP)<\/strong><\/td><td><strong>Malware Function<\/strong><\/td><\/tr><\/thead><tbody><tr><td>System Network Configuration Discovery [T1016]<\/td><td>Loki Bot has the ability to discover the domain name of the infected host.<\/td><\/tr><tr><td>Obfuscated Files or Information [T1027]<\/td><td>Loki Bot has encoded strings with Base 64 encoding.<\/td><\/tr><tr><td>Obfuscated Files or Information: Software Packing [T1027.002]<\/td><td>Loki Bot has used several packing methods for obfuscation.<\/td><\/tr><tr><td>System Owner\/User Discovery [T1033]<\/td><td>Loki Bot has the ability to discover the system information and username on the infected host.<\/td><\/tr><tr><td>Exfiltration Over C2 Channel [T1041]<\/td><td>Loki Bot has the ability to initiate contact with command and control to exfiltrate stolen data.<\/td><\/tr><tr><td>Process Injection: Process Hollowing [T1055.012]<\/td><td>Loki Bot has used process hollowing to inject into legitimate Windows process vbc.exe.<\/td><\/tr><tr><td>Input Capture: Keylogging [T1056.001]<\/td><td>Loki Bot has the ability to capture input on the compromised host via keylogging.<\/td><\/tr><tr><td>Application Layer Protocol: Web Protocols [T1071.001]<\/td><td>Loki Bot has used Hypertext Transfer Protocol for command and control.<\/td><\/tr><tr><td>System Information Discovery [T1082]<\/td><td>Loki Bot has the ability to discover the computer name and Windows product name\/version.<\/td><\/tr><tr><td>User Execution: Malicious File [T1204.002]<\/td><td>Loki Bot has been executed through malicious documents contained in spear phishing email.<\/td><\/tr><tr><td>Credentials from Password Stores [T1555]<\/td><td>Loki Bot has stolen credentials from multiple applications and data sources including Windows operating system credentials, email clients, File Transfer Protocol, and Secure File Transfer Protocol clients.<\/td><\/tr><tr><td>Credentials from Password Stores: Credentials from Web Browsers [T1555.003]<\/td><td>Loki Bot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and Chromium and Mozilla Firefox-based web browsers.<\/td><\/tr><tr><td>Hide Artifacts: Hidden Files and Directories [T1564.001]<\/td><td>Loki Bot has the ability to copy itself to a hidden file and directory.<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Introduction LokiBot was first advertised and it originated in underground forums in 2015 as an information stealer and keylogging software. Since then, it has added various capabilities and affected many people globally. Lokibot was deployed as a botnet initially, in which a number of compromised systems infected with the malware communicate with command-and-control (C&amp;C) servers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2150,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2136"}],"version-history":[{"count":5,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2136\/revisions"}],"predecessor-version":[{"id":4208,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2136\/revisions\/4208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2150"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}