General

  • Target

    7a6448589a7952c70e33a3126af694c4_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240527-y2mlpagg3s

  • MD5

    7a6448589a7952c70e33a3126af694c4

  • SHA1

    c9282931a4f8380cd1a3eca4bc2c26904746a405

  • SHA256

    d550733df6a74b1982a4e1068457fcb261056ab10a2f3b650387552ea8f43922

  • SHA512

    0c30c697690c3fb124c30a38715e848f900209b7b4f22a525d1c5150a8bad8fbc156835425c99acb11aceef4114e593f4f434bb426d05c65044c1b0ee189413a

  • SSDEEP

    24576:jgfnF7uJLa88eYRyjZAK2v80XetvageNMFBjh9XS+:jqnZUGeYRylAKwupTeNM3tRS+

Malware Config

Extracted

Family

lokibot

C2

http://fiseriy.nut.cc/wp-en/ssgjef3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7a6448589a7952c70e33a3126af694c4_JaffaCakes118

    • Size

      1.2MB

    • MD5

      7a6448589a7952c70e33a3126af694c4

    • SHA1

      c9282931a4f8380cd1a3eca4bc2c26904746a405

    • SHA256

      d550733df6a74b1982a4e1068457fcb261056ab10a2f3b650387552ea8f43922

    • SHA512

      0c30c697690c3fb124c30a38715e848f900209b7b4f22a525d1c5150a8bad8fbc156835425c99acb11aceef4114e593f4f434bb426d05c65044c1b0ee189413a

    • SSDEEP

      24576:jgfnF7uJLa88eYRyjZAK2v80XetvageNMFBjh9XS+:jqnZUGeYRylAKwupTeNM3tRS+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks