Rewterz
Rewterz Threat Alert – Donot APT Group – IOCs
July 8, 2021
Rewterz
Rewterz Threat Advisory – Multiple Cisco Identity Services Engine Cross-Site Scripting Vulnerabilities
July 8, 2021

Rewterz Threat Alert – Lokibot Malware – Active IOCs

Severity

Medium

Analysis Summary

Loki Bot is a commodity malware sold on underground sites which are designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets. LokiBot is trojan-type malware designed to inffiltrate systems and collect a wide range of information. Lokibot targets Android and Windows operating systems. It is distributed via spam emails, various private messages (SMS, Skype, etc.), and malicious websites. It is also used for tracking users’ activity (for instance, recording keystrokes).

Impact

  • Information theft
  • Exposure of sensitive data
  • Credential theft

Indicators of Compromise

MD5

  • 940f99dce1b27c608eafc4e47864fa01
  • 3ea4639e4da6290ae0ac20a72a3b19dd
  • 28b96f2258b55c1eb3a44b14e74e5238

SHA-256

  • f57be5308570597a73f0a1535d209c84c75e1f14e193ad4b670b6f005e1eebd5
  • 52a330fcf88eb3f54632c90b02954f323415f84e61b5e1a4e06e0fbf076127f2
  • bd551a9ca4ece262dac879050ddb859baf6a610cb68f533cd0854c4f0df0acac

SHA-1

  • f5fb11d082070e1bdd23991733803f8987673639
  • c274fcc51498fa95a50914e081c9de1adef187bd
  • 76d5c3b3d218e09fb9bd83a6b54cadaa838e447c

URL

  • http[:]//209[.]141[.]34[.]39/pote/pin[.]php
  • http[:]//lifestyledrinks[.]hu/wp-includes/cs2/xx2p14[.]exe
  • http[:]//pakilogs2020[.]xyz/t/e/ff[.]php
  • https[:]//pakilogs2020[.]xyz/t/e/ff[.]php
  • http[:]//185[.]227[.]139[.]18/dsaicosaicasdi[.]php/kUyvFwiy5TIN3
  • http[:]//northvistatrading[.]com/admin/admin/Panel/five/fre[.]php
  • http[:]//185[.]227[.]139[.]18/dsaicosaicasdi[.]php/HsSpKI8PLZu2g
  • http[:]//185[.]227[.]139[.]18/dsaicosaicasdi[.]php/Gi4uJRts3jTJM

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.