General

  • Target

    957ca30d94029edddebefce67d130e87_JaffaCakes118

  • Size

    580KB

  • Sample

    240604-tqkwhace51

  • MD5

    957ca30d94029edddebefce67d130e87

  • SHA1

    048cefcd88d276aec8a77dad500ed6dbe7160b15

  • SHA256

    6976207951b43cf1527144d93653a59e98c1b449d4ce358fc9950ad7908a5ce4

  • SHA512

    0f4ee8b041ac3741d57badfeb0c112c2b36181249f01ecbfee2687d2923a33e71b7ab5b05a595f4796c1cf14de93051be8785af1059b0cf1ca36c37fb52c81d6

  • SSDEEP

    12288:VdvK21V4zLlMPAiH756kp9/KZDzr5T8y8bq4HDbjl6i:ny21VwLkAQw8KZHr5TIBH1

Malware Config

Extracted

Family

lokibot

C2

http://parkrosegroup.info/lewy/sun/emmy/solar/gem/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      957ca30d94029edddebefce67d130e87_JaffaCakes118

    • Size

      580KB

    • MD5

      957ca30d94029edddebefce67d130e87

    • SHA1

      048cefcd88d276aec8a77dad500ed6dbe7160b15

    • SHA256

      6976207951b43cf1527144d93653a59e98c1b449d4ce358fc9950ad7908a5ce4

    • SHA512

      0f4ee8b041ac3741d57badfeb0c112c2b36181249f01ecbfee2687d2923a33e71b7ab5b05a595f4796c1cf14de93051be8785af1059b0cf1ca36c37fb52c81d6

    • SSDEEP

      12288:VdvK21V4zLlMPAiH756kp9/KZDzr5T8y8bq4HDbjl6i:ny21VwLkAQw8KZHr5TIBH1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks