General

  • Target

    1d4fa309108061f3c51b80f071f26f3c_JaffaCakes118

  • Size

    308KB

  • Sample

    240506-tmzv9acg84

  • MD5

    1d4fa309108061f3c51b80f071f26f3c

  • SHA1

    dca63e99f89cee44b89cefa9e7da53ee65e07f46

  • SHA256

    6af1c2eaab23e63e51e0089fd6e94d5079bb5ce141b9684bda854f378f1f0977

  • SHA512

    1300867cef3cb6404099450decd8335f452ecf1cf6e30c2b55954517986bb6d522f2993e31b640ac688b254f56d0135bc4c5d36bc9bc83be0dfc4f4309f483c4

  • SSDEEP

    6144:6CN9BcsqVD9kJEJsxN0lGB3IOAtNu/vuVizzXI2mWYyWtMmB4tojPMenp+:6ISsqMJEJI09OCQ/mVizDI1LyWq04CP8

Malware Config

Extracted

Family

lokibot

C2

http://www.institutoiav.edu.uy/panel/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      invoice.exe

    • Size

      437KB

    • MD5

      eaec0731e156084db154c7fe1546f5fc

    • SHA1

      fdd39cf398f1992f8c369cc2cefafd63f8062400

    • SHA256

      f107886143b6c729851c50f52239b45bf8b15df46db1706964ebfa336e641e0b

    • SHA512

      e10d8cab25cd509b4f4d0c122d6bfe224c15e69119b441142255cb7c4b2c722ca4a990cfc004b65e2b72a58ce2a4cadb58bcbdc88d75567fa8969b554e1cb158

    • SSDEEP

      6144:UdgRjqJQOj2p+llPEpktvbAtXzwhsTi538uRoqaJ5Ga7jkqVpvp:Vkrj2p+llPzvNeK8uRVaJ5Gejk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks