General

  • Target

    51eedf5bd2bd0db8c5f2a15020c156da_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240517-21dtyafg69

  • MD5

    51eedf5bd2bd0db8c5f2a15020c156da

  • SHA1

    7a13fbcda302be2ff99f2f8946224ef0b7e333f7

  • SHA256

    1e7411386f8d79f2dccaf04740d98c9914cfc121d369330afeea0e95e225769f

  • SHA512

    5a8a9872c967a79b7398009483b7fea8b6fbaa40f15b5a25ac4dae56c4c6a69c26a92d7604bbcd9a0a23ec256c1b8abf83f79d435a8a60ab565617f4bd974f56

  • SSDEEP

    24576:yANGXyUih3sEK3q3aUxle5KD2fhUR5sexCH:yANwyDqEe54R5sAC

Malware Config

Extracted

Family

lokibot

C2

http://abscete.info/hero/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      51eedf5bd2bd0db8c5f2a15020c156da_JaffaCakes118

    • Size

      1.1MB

    • MD5

      51eedf5bd2bd0db8c5f2a15020c156da

    • SHA1

      7a13fbcda302be2ff99f2f8946224ef0b7e333f7

    • SHA256

      1e7411386f8d79f2dccaf04740d98c9914cfc121d369330afeea0e95e225769f

    • SHA512

      5a8a9872c967a79b7398009483b7fea8b6fbaa40f15b5a25ac4dae56c4c6a69c26a92d7604bbcd9a0a23ec256c1b8abf83f79d435a8a60ab565617f4bd974f56

    • SSDEEP

      24576:yANGXyUih3sEK3q3aUxle5KD2fhUR5sexCH:yANwyDqEe54R5sAC

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks