General

  • Target

    6638d5300b1a25f07aa08472d8b537f8_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240729-24dncazcnf

  • MD5

    6638d5300b1a25f07aa08472d8b537f8

  • SHA1

    84ce1185dc19e03530e71eb0f37200d2e35718e2

  • SHA256

    8dd56c5aa40f91ae736c97689bab5066c2fd86f5a3cd181851579dcb5b42ed50

  • SHA512

    53cbafc5ebeacc311a4355fcd5b4bf5d84f533efad396643b02a30a671219b86b824b94e4ed83c33016ca44d4685138d4d46bad5682ffd741e6bd2a30eb233cc

  • SSDEEP

    12288:8BRcXM3Uc4yEUdqhfwxgcQYRpS3hF6vqA+T7C/9qOo:QUBcxqhffV2vDEe/

Malware Config

Extracted

Family

lokibot

C2

http://79.124.8.8/plesk-site-preview/chongelctricals.com/http/79.124.8.8/que/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Packing Lists.exe

    • Size

      580KB

    • MD5

      1b0d830a35b27bf1d8921df876d72c20

    • SHA1

      ef5c6defb67e3a73f7fb36668e8cd6901d72bab8

    • SHA256

      b3632e0dd5c285e714fa880ab59e27fbc7678b220dd19661587b4501f9df51f6

    • SHA512

      a7af313f3e547645e84818e3506c164ac3935f0980c57cdcbbf8d810e11726821efc2e1a9a198c07ba894029f6a3ef583c955d8d2ac41857763ba7effb8c1cc3

    • SSDEEP

      12288:MBRcXM3Uc4yEUdqhfwxgcQYRpS3hF6vqA+T7C/9qOo6:AUBcxqhffV2vDEe/1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks