In today’s post, we want to remind our readers about LokiBot infostealer that provides backdoors to the victim Windows OS and enables fraudsters to steal sensitive data and even bring in place different payloads. LokiBot infostealer comes to the victims via malspam campaigns often masquerading as a trusted sender, containing an attached document luring the receiver to immediately open it. Being distributed in phishing campaigns worldwide, LokiBot became even more virulent during the pandemic, as it was observed in the recent campaign when the emails addressed the information referring to the update from WHO with their trademark to be akin to a legitimate sender.
Once LokiBot is successfully delivered to the victim machine, it starts harvesting and sending as much sensitive information as it may get including passwords stored in browsers, email passwords, and FTP credentials.
LokiBot Detector (Windows10) (Sysmon Behavior) Sigma rule by Lee Archinal helps to detect the presence of the infostealer
The rule has translations for the following platforms:
SIEM: ArcSight, QRadar, Splunk, Graylog, Sumo Logic, ELK Stack, RSA NetWitness, Logpoint, Humio
EDR: Carbon Black, CrowdStrike, Elastic Endpoint
Tactics: Execution, Defense Evasion, Persistence, Privilege Escalation
Techniques: Rundll32 (T1085), Scheduled Task (T1053)
Read more about Covid19-related malware activities and SOC Prime recommendations here.
Ready to try out SOC Prime TDM? Sign up for free.
Or join Threat Bounty Program to craft your own content, share it with the TDM community, and earn on it!