General

  • Target

    45a33ccbd58c5e6033e758409c7d8d2c_JaffaCakes118

  • Size

    171KB

  • Sample

    240714-npnccaycpn

  • MD5

    45a33ccbd58c5e6033e758409c7d8d2c

  • SHA1

    d9ba19b720ea87b87538d13fad0710cbf5bdc779

  • SHA256

    23b61d5cf710aa3b507eab972672572c6a3febb8f70fe81d35541b24cf6462f6

  • SHA512

    7e64b7371ca294dfe41216ed6a17051b19d970b236bb4e0f0619678ff647aa930ecd56808a623e7030ef15fd49e4b0f2112abab9df411ca86b102a3892812d97

  • SSDEEP

    3072:suGb/SWCzVOzvpMdQ/eeSq1jCY+Mr/E+Dtqn0ArQOlyjB9Ur1iRzvpktLOLq3RLJ:cG5fQ2eH1mYf/E8ArJyYrsFpmOLqBY1O

Malware Config

Extracted

Family

lokibot

C2

http://umarguzardijye.com/work/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      IPP_Commercial Terms..exe

    • Size

      302KB

    • MD5

      55888d7c8305ccc5d2547f02ea5efe1b

    • SHA1

      a3c7d3144f89595380d755ef4d806737028458a6

    • SHA256

      572e22283bac84f3439061bf4a127fc5fc3be6c9bb61d0b28190b231098ca9ee

    • SHA512

      035dfd42884a901fb7fc421c8ee21dc91042a971a1cac2a856be3ea3e4d77087c7b67e012bec2f9d7af3a2670d40a716e00772812cdb42f034bf87f1765c0c2b

    • SSDEEP

      6144:1gn8irYJhSC4KdDKoP3I5qAQELNmCIKb:emJh/lI5qAXNmCIK

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks