General

  • Target

    828e0fbb16f93615b6469946e7f7c3ec_JaffaCakes118

  • Size

    769KB

  • Sample

    240530-a65q3ahc29

  • MD5

    828e0fbb16f93615b6469946e7f7c3ec

  • SHA1

    3242a2061ac325142952488b0a072c5c476da036

  • SHA256

    40c3acdd2174f812c9afe8a9c416642f80cbb461e7a4c061ec3307048c1a1c07

  • SHA512

    c83c644b342ec4ee9fd9d6935cb8efc8cfcc79814b583bfaeae33cdc7b03c5ef887c738a47b008b8a9d02f4b1b72d34af72c215b1cac100c7ec15bd11976a09c

  • SSDEEP

    24576:pK/AsNDvLZfTbx/uwf9R99BoUybYeLf+akZ:4dNDvLZ0cR992Uyb2

Malware Config

Extracted

Family

lokibot

C2

http://ogaces.ru/michelle/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      828e0fbb16f93615b6469946e7f7c3ec_JaffaCakes118

    • Size

      769KB

    • MD5

      828e0fbb16f93615b6469946e7f7c3ec

    • SHA1

      3242a2061ac325142952488b0a072c5c476da036

    • SHA256

      40c3acdd2174f812c9afe8a9c416642f80cbb461e7a4c061ec3307048c1a1c07

    • SHA512

      c83c644b342ec4ee9fd9d6935cb8efc8cfcc79814b583bfaeae33cdc7b03c5ef887c738a47b008b8a9d02f4b1b72d34af72c215b1cac100c7ec15bd11976a09c

    • SSDEEP

      24576:pK/AsNDvLZfTbx/uwf9R99BoUybYeLf+akZ:4dNDvLZ0cR992Uyb2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks