General

  • Target

    3548d4c1812e0427c0366354ea0a976d_JaffaCakes118

  • Size

    171KB

  • Sample

    240710-srhl4axdrc

  • MD5

    3548d4c1812e0427c0366354ea0a976d

  • SHA1

    ac63ee9205498ae8ec61559adb516d290a3a98ac

  • SHA256

    737e8c1bb2310d364d9ab0eec4c8a04042e56ccfe56d993360eee96528fc0af2

  • SHA512

    8460ef4d1086181126f324887d28523fc02ac221cddd70e7e075654572be1aa7861ddc9375be72ecf520be034b8c18858dde1d4336a293c6199b796635b6c93a

  • SSDEEP

    3072:IuGb/SWCzVOzvpMdQ/eeSq1jCY+Mr/E+Dtqn0ArQOlyjB9Ur1iRzvpktLOLq3RLJ:gG5fQ2eH1mYf/E8ArJyYrsFpmOLqBY1O

Malware Config

Extracted

Family

lokibot

C2

http://umarguzardijye.com/work/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Material Requisition (Technical Requirements).exe

    • Size

      302KB

    • MD5

      55888d7c8305ccc5d2547f02ea5efe1b

    • SHA1

      a3c7d3144f89595380d755ef4d806737028458a6

    • SHA256

      572e22283bac84f3439061bf4a127fc5fc3be6c9bb61d0b28190b231098ca9ee

    • SHA512

      035dfd42884a901fb7fc421c8ee21dc91042a971a1cac2a856be3ea3e4d77087c7b67e012bec2f9d7af3a2670d40a716e00772812cdb42f034bf87f1765c0c2b

    • SSDEEP

      6144:1gn8irYJhSC4KdDKoP3I5qAQELNmCIKb:emJh/lI5qAXNmCIK

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks