General

  • Target

    7d7a407525b33c6a65a7dc28633452ff_JaffaCakes118

  • Size

    519KB

  • Sample

    240528-s1kstabf38

  • MD5

    7d7a407525b33c6a65a7dc28633452ff

  • SHA1

    27da4e3ae0efe231661ff308d7f732ea7174f21c

  • SHA256

    022af0ecf3a521d7f3605b381de45bd38712034750cdfedfef575204009601c9

  • SHA512

    b22871a5c4237d8acd109088eda2d898294c5a19dce1936ec9a8b2b50a11447910611d2deeea4c8fd489cf3618c5366ed954fe61c1c6b740f5b284c3b425fff5

  • SSDEEP

    12288:B8NW8/P4jNbilT4gnDyiFBD9h/IcjV+vM3x4cUQ48wvEMgkR:BmWWuTOOiFBDDIpMKHkkR

Malware Config

Extracted

Family

lokibot

C2

http://jumbie.duckdns.org/pursuit/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Ship88912.exe

    • Size

      639KB

    • MD5

      7fbbde39e6948f8bf39b4711cee0bcfb

    • SHA1

      bda562ef58f8bb0d20ae6d51adf695cbb6dcd9df

    • SHA256

      c36a6d093a31124e6b050c3eb81b366560f6d511771a6fed3424877ce4992ff7

    • SHA512

      f46ceefe9ec9efe556b98933245be0b8871e539c2da2589a4fd5e2b5a08da79b29c361ff4a6530fcecd22ab94b2253aaa6759b6f488de8a5d12bb9c2ee15daa6

    • SSDEEP

      12288:uJWgxAqTvbqbWTsX+tGwOH0UZ/Icz3D+vs3x8chtMCl8wvEugkN:zglru6TUwOUmI238sOcWCzEkN

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks