General

  • Target

    0f58e05fb244673c1f0c10f556f0bc0b_JaffaCakes118

  • Size

    417KB

  • Sample

    240503-bqck1sbe5y

  • MD5

    0f58e05fb244673c1f0c10f556f0bc0b

  • SHA1

    d40a8f22e2c4e616eb99cd4d49cad4f61e060142

  • SHA256

    235678afae67a874474bba158f96246ef5ca70292521e2b22b789021398cb3e6

  • SHA512

    6cbd8fa6fc97580342f086ebde981cdc5afe97a2d87d6ebf0679cc3f956b739695a0c26d2b6c0b742e102b8151dec8c5aeb065d91e32bc2754e6c085b55dc0e2

  • SSDEEP

    12288:kyu5RCaq3A+8E6rGzOm0V6HDyHEX1JzzBbYpz6:Fu5RCfw5rN2+EbzVspO

Malware Config

Extracted

Family

lokibot

C2

https://tkanilux.com.ua/wells0/wrgo/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ETD 15-09-2020 (MV.HYUNDAI SUPREME V. 102N_PDF.exe

    • Size

      803KB

    • MD5

      e6681861bd070231aeb0a739e821e7c4

    • SHA1

      99ee12bc70b3d123bd2fdbb4b0b0f42f01fe678e

    • SHA256

      af32eccfa67cab29e2766a587fe7139aa89e76d012b37ef074aa1c4cd086141f

    • SHA512

      dad693de4634eb8fd1a2100ba8062cbaa8be4557686f6312aaaf42e424cfad8feec8791e0b9b00faa5f74161e7f3fa9778f6b038ffc65052ab4a5ec7fbc1e830

    • SSDEEP

      12288:eb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hOCR0N17lz:veSHhYRRxOVGcxJBdb1knp

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks