Rewterz Threat Alert – Donot APT Group – Active IOCs
November 22, 2021Rewterz Threat Advisory – CVE-2021-43557 – Apache APISIX Directory Vulnerability
November 23, 2021Rewterz Threat Alert – Donot APT Group – Active IOCs
November 22, 2021Rewterz Threat Advisory – CVE-2021-43557 – Apache APISIX Directory Vulnerability
November 23, 2021Severity
Medium
Analysis Summary
LokiBot is a commodity malware sold on underground sites which are designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets. LokiBot is trojan-type malware designed
to infiltrate systems and collect a wide range of information. Lokibot targets Android and Windows operating systems. It is distributed via spam emails, various private messages (SMS, Skype, etc.), and malicious websites. It is also used for tracking users’ activity (for instance, recording keystrokes)
Impact
- Information Theft
- Exposure of Sensitive Data
- Credential Theft
Indicators of Compromise
Filename
- loader2[.]exe
IP
- 198[.]23[.]207[.]36
MD5
- bfe39cdc4f88f7fc7a9d457639828a74
SHA-256
- 46f103cd2d5aad169b4cf0d6668a3d0ddc2c2bc6aef0606e64a5f8f1eadd836a
SHA-1
- 53d9ff1d0f0d5f5c93fb0bc68e39a079f26237c7
URL
- http[:]//198[.]23[.]207[.]36/xx/
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.