General

  • Target

    fcb2e2efcc7e62c2ba768b38de32c4ee_JaffaCakes118

  • Size

    870KB

  • Sample

    240420-nxltgsfh68

  • MD5

    fcb2e2efcc7e62c2ba768b38de32c4ee

  • SHA1

    f96556d5b63c186c04db83de14937b50afd80ceb

  • SHA256

    da76b22e9c5f9cc5f23d760b6ccb284c6291853e09e753be373c37e54cbf6e46

  • SHA512

    0313f88287293ad028886fa51773e3dc61a1fdadaf7fb66b93c1a25c03c52952cd0d514f35e9c9b082cb1bb7511f2b9ee706d05b2d28af592041db186004fad1

  • SSDEEP

    24576:5wrE8CS/d3YK64JyUqstyFBr5oOMZq8gFe2b:56gK64J8FBrlMZq8ie

Malware Config

Extracted

Family

lokibot

C2

http://abixmaly.duckdns.org/binge/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fcb2e2efcc7e62c2ba768b38de32c4ee_JaffaCakes118

    • Size

      870KB

    • MD5

      fcb2e2efcc7e62c2ba768b38de32c4ee

    • SHA1

      f96556d5b63c186c04db83de14937b50afd80ceb

    • SHA256

      da76b22e9c5f9cc5f23d760b6ccb284c6291853e09e753be373c37e54cbf6e46

    • SHA512

      0313f88287293ad028886fa51773e3dc61a1fdadaf7fb66b93c1a25c03c52952cd0d514f35e9c9b082cb1bb7511f2b9ee706d05b2d28af592041db186004fad1

    • SSDEEP

      24576:5wrE8CS/d3YK64JyUqstyFBr5oOMZq8gFe2b:56gK64J8FBrlMZq8ie

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks