General

  • Target

    1e0c4989c25330809b09b384f14c1535_JaffaCakes118

  • Size

    377KB

  • Sample

    240506-ya4e5aah97

  • MD5

    1e0c4989c25330809b09b384f14c1535

  • SHA1

    99ed6ece8825c3a2ea8316fa07003f44f8cc47e0

  • SHA256

    55eb233bc661114ccbc1941dedff2239de891ccf4b40d57ac0cd64f13a9492ad

  • SHA512

    ba8cc55e01744f04ae86b7344f043e0c34088cf126a91316836693aa7b243ea41c35f68966bd33deed9b338a48d09a93fdfdfee59b2915ae31fd65fc5199ab6a

  • SSDEEP

    6144:Rx7Dc3sgtdXoFzw+OBdFRxvhVGrzNBJuosy0Mvo2VM5eRfSTFwRLjCw:z0jdXou+idDljIuoJ7/GwhjZ

Malware Config

Extracted

Family

lokibot

C2

http://autocomms.co.za/dprove/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7WB2771.exe

    • Size

      726KB

    • MD5

      cc52768fba25339bb3c573ce685bdd9f

    • SHA1

      a8b8bc429b23081d830834f06df68b1b655980ec

    • SHA256

      b7e6fc48e8a381fa0413834a185577a49644a8da2265bfa4e762703f89bc16a9

    • SHA512

      83d62af8a730aeab0e4ce5685d8ded1f12bdf186afdd20f8e18cbd26ba9ce6397e03b35137d038d02cd86e98246d9dda5729b643e798a517751c0f4a66769148

    • SSDEEP

      6144:y9S7DcJsGXdXQ5ze+OPHFPxvhVGFzNBJuYsU0mvoWVMNe3fSTFwwy:yS0zdXQM+iHlljouYBlzGwwy

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks