General

  • Target

    78d89a897e8ef98afb21ff026645ff68_JaffaCakes118

  • Size

    230KB

  • Sample

    240527-mh9fkage2s

  • MD5

    78d89a897e8ef98afb21ff026645ff68

  • SHA1

    8d7b97d035cdd26b7fd32b0c0e954e9539114113

  • SHA256

    0eb3f48092f0c494da8ae015a5e76b2154e66938ec954f72eb6caf6257f9fb3c

  • SHA512

    73cbceaeb303242fa3571441e0cc4cd39d332f872474373c2a29dcdece322f34a9fade0ba6d7227edd2aaa09f80a5fc38e781969cf46b0d86463df45463d6f58

  • SSDEEP

    6144:DncrSScLjvkMPLVmHfPIMuJTBwmrw0ybqL3wO+gl0zNuwl/Hg2:or9ijv/GP9uJnrlybqLgZg2

Malware Config

Extracted

Family

lokibot

C2

http://nucsquaremall.ga/~zadmin/lmark/ch/link.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DHL PACKAGE DELIVERY - JPG.exe

    • Size

      248KB

    • MD5

      7597be45c875ab263b477b7e168b4d82

    • SHA1

      a9f82f1d489ec2da4cb8da87246715a4f036b7c9

    • SHA256

      432e7077214ceda59a7af2e405a37b09fb97455a2dfba3c83832ad087eaedc30

    • SHA512

      5ba03e286e0e555e64c3818f053bd8c3134cc8064d82a2252945257fc157cd0ac2ad9975d529f588998cd2410cc4b9c7a76a8e19ddb18764a258ab8fa668b0c4

    • SSDEEP

      6144:AmGIha2fc6BiVDNob16O7Hq99qv1OckGrPWqvD18h:X22fc6koZ6G2GrPHvD18h

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Target

      $TEMP/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10
    • Target

      $TEMP/carritches.dll

    • Size

      72KB

    • MD5

      c71e507b870b4a3d412ebf32807e3ec9

    • SHA1

      df1b2e859f0b4adf31c83f2c6ff170d7c3802174

    • SHA256

      4ce8d5ab293bf630573a86d6cd80862facbe2ee03170db808b5567730b5aee99

    • SHA512

      dfc433ddb23f1c73d4d688189e0cf180710d8210d4ec9332bfdeea1f6cb53b04ecc647d200fdaa476f4518a28544d048e3808af16a6c58a2f018b63042dc9720

    • SSDEEP

      768:L/KmoG0U2PH9sFj9TF7jC2W5ZW8G/WzYqorlXv50KnV+UTk1tn3:L+Vt9srF7jcZW//WzYJXvqKnY/t3

    Score
    1/10
    • Target

      $TEMP/rating/dirname/tos/lc.exe

    • Size

      36KB

    • MD5

      d75bc7c5c9cbe540d5a7b353ca3ad8af

    • SHA1

      79db387f0698893cba6a7d5a65e7661e9e41286f

    • SHA256

      d4ed7e3418e142b49392766acf2883c79346ee8f9475fdd6d0b9bd71e2547d42

    • SHA512

      e770f247eaf9f0b745a57cdb0eccdbf95e1edf5d9a79d4b8e1ee1c7ff7c37b4d5e39223b3cadd69c6bcd59fc03199e76a8d5df71898306b600ba803276043857

    • SSDEEP

      384:QQ9pEZKM5jMAzhvoPMHb7Z3Ya4X57g6ihJSxUCR1rgCPKabK2t0X5P7DZ+3UiKeF:ZMZ9MMHbo57FRJfO

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks