General

  • Target

    80d063bed9b15855725247e0b7769022_JaffaCakes118

  • Size

    224KB

  • Sample

    240529-p7jbsafh68

  • MD5

    80d063bed9b15855725247e0b7769022

  • SHA1

    795a2eecfcdd5ccdd533edc674c2092ee37a25aa

  • SHA256

    5524636c5b3d49f1dafb9d4d702e54f004a724cc8e6f30210eb4076318624806

  • SHA512

    a57557533f12e530c9bc2d322cad03cff8af9405e4136c5778523b4218c6cb9f9aae6aaf790c9b4405b474a63610b536fbd77a78eb49b89ad8db92b632dfcfc3

  • SSDEEP

    6144:UyRQREq2bb90ht781Q+EjQYNrTb67i6ZX5sFfGmI47G:UyRQRH2S3bqmPJ6ZX5gOmd7G

Malware Config

Extracted

Family

lokibot

C2

http://shungkargo.com/hoist/logs/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Contract-PO#3112 , PDF.exe

    • Size

      264KB

    • MD5

      2fe6d6977a4f4c872972251f44e8da96

    • SHA1

      c229e283a2f5acc521e0ddf4ddb4b38b6b789d50

    • SHA256

      1d4569c5de3bbc1c1b6a430bd4ca0652a9b91823faa19aa433dc87d408efa8c7

    • SHA512

      29d1fba6edea241b17244c8f9fc3b706fdd30b53b55f339f9bcb388ff56b8bf506c4cb511dc9275997197f8e55ec326ecd8691b917f21e08beea42ab98fdd57d

    • SSDEEP

      6144:LMyqKXpO6nmk4/A4fgMrgcPCgXKefw+Ya4:jqKXsjd/AXcg+n45

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks