2017-12-13 - LOKIBOT INFECTION FROM RTF EXPLOITING CVE-2017-11882

NOTICE:

ASSOCIATED FILES:

  • 2017-12-13-Lokibot-malspam-tracker.csv   (993 bytes)
  • 2017-12-12-Lokibot-malspam-1359-UTC.eml   (57,498 bytes)
  • 2017-12-12-Lokibot-malspam-1400-UTC.eml   (57,498 bytes)
  • 2017-12-12-Lokibot-malspam-1402-UTC.eml   (57,498 bytes)
  • 2017-12-12-Lokibot-malspam-1404-UTC.eml   (57,497 bytes)
  • 2017-12-12-Lokibot-malspam-1416-UTC.eml   (57,498 bytes)
  • 2017-12-13-Lokibot-infection-traffic.pcap   (926,390 bytes)
  • 7571BA.exe   (286,720 bytes)
  • Order From Dekkogroup Canada.doc   (40,229 bytes)
  • em.exe   (385,024 bytes)
  • hp.exe   (438,272 bytes)
  • ki.exe   (442,368 bytes)
  • lj.exe   (434,176 bytes)

NOTES:

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

EMAILS


Shown above:  Screenshot from the spreadsheet racker.

 


Shown above:  Screenshot from one of the emails.

 


Shown above:  Email headers from one of the emails.

 

EMAIL INFORMATION:

 


Shown above:  RTF attachment from one of the emails.

 

TRAFFIC


Shown above:  SMB traffic from the infected Windows host filtered in Wireshark.

 


Shown above:  HTTP traffic from the infected Windows host filtered in Wireshark.

 

ASSOCIATED TRAFFIC:

 

FILE HASHES

MALWARE RETRIEVED FROM THE INFECTED WINDOWS HOST:

 

MALWARE FROM THE SMB SHARE:

 

IMAGES


Shown above:  Lokibot malware persistent on the infected host.

 


Shown above:  Connecting to \\185.45.192[.]7\s as a shared drive on a Windows host.

 

Click here to return to the main page.