BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
15
Global rank
47 infographic chevron month
Month rank
73 infographic chevron week
Week rank
0
IOCs

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Stealer
Type
ex-USSR territory
Origin
3 May, 2015
First seen
21 October, 2024
Last seen
Also known as
Loki
LokiPWS

How to analyze LokiBot with ANY.RUN

Type
ex-USSR territory
Origin
3 May, 2015
First seen
21 October, 2024
Last seen

IOCs

IP addresses
178.159.39.36
Hashes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https://dddotx.site/ClarkB/PWS/fre.php
http://94.156.177.220/logs/five/fre.php
http://104.248.205.66/index.php/pages
http://ikenna.spxlfow.com/five/fre.php
http://touxzw.ir/sirr/five/fre.php
http://168.100.10.152/index.php/7953330748856
http://blesblochem.com/two/gates1/fre.php
http://freighteightonecam.sytes.net/ndifygidj/five/fre.php
http://solefex.com/clock/five/fre.php
https://dddotx.shop/Mine/PWS/fre.php
http://solutviewmen.viewdns.net/bdifygidj/five/fre.php
http://137.184.191.215/index.php/10899
http://137.184.191.215/index.php/check.php
http://dddotx.shop/Mine/PWS/fre.php
http://168.100.10.152/index.php/wp.php
http://137.184.191.215/index.php/039
http://168.100.10.152/index.php/check
http://werdotx.shop/Devil/PWS/fre.php
http://trvtest.click/RF/PWS/fre.php
http://104.248.205.66/index.php/modify.php
Last Seen at

Recent blog posts

post image
Malware Analysis Report in One Click
watchers 7289
comments 0
post image
Cyber Information Gathering: Techniques and T...
watchers 451
comments 0
post image
ANY.RUN’s Upgraded Linux Sandbox for Fast and...
watchers 572
comments 0

What is LokiBot malware?

LokiBot, also known as Loki-bot or Loki bot, is an information stealer malware that collects credentials from the most widely used web browsers, FTP, email clients, and over a hundred software tools installed on the infected system. It was developed in one of the ex-USSR countries.

The trojan was discovered for the first time on May 3rd, 2015, from a sale announcement made by the creator, and the malware is still active to this day.

General description of LokiBot

Initially created and sold by a hacker known as "lokistov" or "Carter," the first versions of LokiBot spyware used to cost up to $400. However, almost identical malware appeared on hacker forums soon after, available for as little as $80 from several sellers. As it is thought, "lokistov" himself was hacked, and the virus's source code was leaked, allowing others to use its techniques and sell remarkably similar malware.

Curiously, a researcher subsequently found out that the first version of the virus got patched by someone without accessing the source code, which gave the hacker community the ability to set a series of individual domains used to receive the retrieved data.

Even though several versions of the virus exist today, after the analysis, it was found that all of them are actually modifications of the original malware. Interestingly, the server to which LokiBot stealer sends data is unique for every particular malware sample.

In the latest versions of LokiBot, a third stage is added to the process of compromising systems, besides more encryption, a technique to escape detection. Each layer of the trojan is encrypted to attempt to hide the eventual source of code.

The malware uses the known technique of blurring images in documents to force users to enable macros. This trick infects machines quite successfully.

LokiBot malware analysis

An analysis session displaying the simulation of the contamination process created by the ANY.RUN interactive malware hunting service provides the perfect opportunity for malware analysis to see how the contamination process unfolds on an infected machine. As shown in the simulation, LokiBot trojan needs email attachments, such as a Microsoft Office file or an archive file to be opened to enter an active phase.

process graph of lokibot stealer execution Figure 1: Process graph generated by the ANY.RUN malware hunting service

During the analysis, we found out that the malware life cycle can be broken down into the following stages:

  • Contamination. The victim downloads a malicious archive or a Microsoft Office file which eventually downloads the malware;
  • Being packed initially, the keylogger unpacks itself and begins the execution of the main payload;
  • The virus creates unique loop-functions for each application that it is targeting and saves retrieved data into a buffer;
  • Then, a registry key is modified, and the trojan is explicitly copied into a folder with a specific name unique name under the %APPDATA% folder. This allows the virus to establish persistence. MachineGuid MD5 is used for the name generation, and the name can also be used as a Mutex as well as bot-id. As the last action of this step, the virus generates a registry key that points to the file it copied before to the specific folder inside the %APPDATA% folder;
  • Then, depending on if the current user is privileged or not, the virus sets persistence either under HKEY_LOCAL_MACHINE or KEY_CURRENT_USER;
  • Next, general system information is sent to the C&C server;
  • For persistence, the keylogger then applies the triple-DES encryption technique to the URL and the registry key;
  • After this, the virus starts waiting for commands from C&C, creating a new thread to detect the C&C response.

How to avoid infection by LokiBot virus?

Since LokiBot spyware requires macros to be activated to infect the system, attackers will do everything in their power to make the victim enable them. Thus keeping macros turned off is the best bet to stay protected from the trojan. Notably, extra caution should be exhibited when a document downloaded from a suspicious source or an unknown email address prompts to enable macros.

Also, having antivirus software from trusted developers and keeping it updated is an excellent way to decrease the probability of becoming the malware's victim and protecting credentials. Another good common practice is to be highly mindful when opening attachments or clicking links in emails from unidentified sources as it's a popular method of malware spreading, including FormBook and Dridex.

Distribution of LokiBot

LokiBot stealer is distributed mostly via mail-spam campaigns, prompting the user to download a malicious file that is attached. Remarkably, the three most commonly used types of files are Microsoft Office documents configured to begin the download and installation processes of the malware, archive files containing a Loki-Bot executable or ISO files, and a Loki-Bot executable.

LokiBot execution process

Interactive sandbox simulation conducted on the ANY.RUN malware hunting service allows us to take a closer look at how the execution process of LokiBot unfolds in a case when a contaminated Microsoft Office file is the infection source.

  • The simulation starts with opening a Microsoft Office file. Immediately, WINWORD.EXE is executed with enable macros.
  • Then, through the exploitation of the CVE-2017-11882 vulnerability, Microsoft Office Equation Editor proceeds to download a malicious executable file;
  • Finally, a malicious executable file runs itself and then proceeds to steal the personal data and connect to the C&C server.

process tree of a lokibot stealer execution Figure 2: Illustrates the execution processes of LokiBot as shown by ANY.RUN simulation

a text report of a lokibot analysis Figure 3: A text report created by ANY.RUN

The virus generates multiple artifacts during its execution process. Particularly, four types of files can be simultaneously stored in the secret %APPDATA% directory at any point in time. Those files can have ".exe," ".lck," ".hdb" or ".kdb." extensions, and each file type is used for a specific purpose:

  • .exe files contain an executable copy of the trojan that triggers when a user logs into an account,
  • .lck files are generated to prevent resource conflicts when either Windows Credentials or Keylogging are decrypted,
  • .hdb files are used to store the hashes of all data samples already transmitted to the C&C server
  • .kdb files are in turn used to hold information about the data that is yet to be sent to the server

Based on the analysis, the keylogger uses the following algorithm to name the files:

  1. First, LokiBot takes the value of MachineGuid from the registry branch HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Cryptography . In the case of our simulation, it was set to dc5131b5-5fbc-4f85-b1ed-28d4392080ca.

lokibot mutex creation GUID registry

  1. Then, the virus uses the MD5 algorithm to calculate the hash sum of the MachineGuid, which in our case ended up being c83ba0aa282a966263dda560052b3caf.

lokibot mutex creation md5

  1. Finally, characters from the 8th to the 13th of the resulting hash amount are used as the subdirectory's name, and the characters from the 13th to the 18th are used as the name of the files.

lokibot mutex creation

LokiBot communication with C&C

To communicate with the C&C server, the patched version of the virus, which is also the most widely spread strain, sends a "ckav.ru" string. Interestingly, the sent data is also is a substring of "fuckav.ru."

How to detect LokiBot malware using ANY.RUN?

Among other things, you can detect whether it is LokiBot in front of you or not by looking inside sending packets - there's always text "ckav.ru" inside them. Just click on the sent packet in the "HTTP REQUESTS" tab and take a look inside a packet.

lokibot network stream Figure 4: Lokibot network stream

Conclusion

Lastly, since the first version of the malware was leaked and cloned, eventually becoming available for a significantly lower price than the original, LokiBot spyware became a widely spread malware that continues to appear in several mail-spam campaigns. In fact, the virus has become so popular that its set-up explanation videos on stealing credentials are publically available on YouTube.

Fortunately, modern malware hunting tools like ANY.RUN provides the ability to examine the malware behavior in detail and establish solid protection against the hazard.

Create your free ANY.RUN account today and enjoy unlimited malware analysis!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More