In the rapidly evolving world of cybersecurity threats, LokiBot has become a significant menace. This Trojan malware is infamous for its capability to steal sensitive information, causing extensive damage to both individuals and organizations. In this blog, we will explore the intricacies of LokiBot, its methods of operation, and how you can safeguard yourself against this malicious threat.
What is LokiBot?
LokiBot is a type of Trojan malware that targets Windows systems and is designed to steal sensitive information such as usernames, passwords, and cryptocurrency wallets. It spreads through malicious email attachments, infected websites, and other vectors. Once installed, LokiBot can log keystrokes, capture screenshots, and create a backdoor for attackers to gain further access to the compromised system.
How Does LokiBot Spread?
LokiBot uses various methods to spread and infect systems, including:
Malicious Email Attachments: LokiBot is often distributed through phishing emails with malicious attachments. Once the attachment is opened, the malware is executed, compromising the system.
Infected Websites: Users can unintentionally download LokiBot by visiting compromised websites or clicking on malicious links.
Software Vulnerabilities: LokiBot also exploits unpatched software vulnerabilities to gain access to systems.
Infection Chain:

LokiBot is a sophisticated malware that employs a multi-stage infection process to compromise systems and steal sensitive information. Here's an in-depth look at each step of the LokiBot infection chain:
Initial Vector: The infection typically begins with a phishing email. These emails often contain a malicious attachment, such as a Microsoft Word document or an Excel file, designed to lure the recipient into opening it. In this scenario, it's an XLS Spreadsheet.

Macro Execution: When the user opens the attachment, it prompts them to enable macros. Once enabled, the macro (often obfuscated to avoid detection) executes and downloads a second-stage payload. This stage is crucial as it leverages social engineering to convince the user to lower their defenses.

Second-Stage Payload: The second-stage payload acts as a dropper or a downloader, fetching an encrypted third-stage payload from a remote server. This stage often involves using a web request to retrieve the malicious code, making it challenging to detect through traditional security detection measures.

Third-Stage Payload: Upon downloading, the third-stage payload decrypts and executes the final LokiBot malware. This stage may involve privilege escalation techniques to gain higher access rights on the infected system, allowing the malware to perform its malicious activities more effectively.

Embedded Suspicious URL:

Execution Once LokiBot is fully deployed, it begins its nefarious activities, which include:
Logging Keystrokes: Capturing everything the user types, including login credentials and personal information.
Capturing Screenshots: Taking screenshots of the user's activities to gather more data.
Stealing Credentials: Extracting sensitive information from browsers, email clients, and other applications.
Indicator of Compromise (IOCs):
MITRE ATT@CK MATRIX:
Happy Hunting !!