• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2019-0052 – Juniper SRX Series Junos OS Denial of Service Vulnerability
July 11, 2019
Negligent Employees And Their Vulnerability to Social Engineering
July 11, 2019

Rewterz Threat Alert – Malspam Campaign Dropping Loki Bot Malware

July 11, 2019

Severity

Medium

Analysis Summary

Loki-Bot (also spelled “Loki Bot” or “LokiBot”) is an information stealer that sends login credentials and other sensitive data from an infected Windows host to a server established for each malware sample. LokiBot is a prolific trojan designed to covertly siphon information from compromised endpoints. The malware is known for being simple and effective and for its adoption of diverse attachment types.

Impact

  • Exposure of sensitive information
  • Credential theft

Indicators of Compromise

IP(s) / Hostname(s)

37[.]49[.]224[.]216

URLs

  • hxxp[:]//kamnaexim[.]com/bui/cu/total[.]exe
  • hxxp[:]//www.dnll[.]pw/la/stone/fre[.]php

Email Address

inca.chemicon[@]indocater[.]co[.]id

Malware Hash (MD5/SHA1/SH256)

  • 1b76734447ec104a4fc399c430dd007a
  • a427dcac18d98d24d814d279cb436d22bccb84e60b8f0d30ab793262d93f2b92
  • ed9972a3730f4310c70deb88f8e73cdb9bef86a2cc36c0068ea421dc8f932b25
  • 13404b29411193d09f1884147f84dd15
  • 13a35d9c157c65d14ee288b77e1b7eec14142af7
  • 2c249547abd254445b63e8b594eef7503093dcdf

Remediation

  • Block the threat indicators at their respective controls.
  • Always be suspicious of unsolicited email.
  • Never click/ download any attachments sent from unrecognized senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.