General

  • Target

    32d22136aaa9afb4af8edf1f4a69009d_JaffaCakes118

  • Size

    335KB

  • Sample

    240729-cp5qvaxhlp

  • MD5

    32d22136aaa9afb4af8edf1f4a69009d

  • SHA1

    f315adecebc4046f9848215079b27826abc08e74

  • SHA256

    e3c94b033b803e1f45f6da9e0fb141fea38c55068c975404ca99e4c49dbee45a

  • SHA512

    774989c40cc1559cb9b5a73cafca80e6a56bad4d88611efb21ea136982de04ca40707bb4688c1c1d4955748b4f1cfe02a1fb139ef9067745fa90324dffda304c

  • SSDEEP

    6144:DpZppfYW645usKoklQjEFU/SON44FzzOiQOGaoqnXKO7bhnm/dEqp+UZO:DpZppfYq5uskqEFISOnF/dXKO7bhmRpY

Malware Config

Extracted

Family

lokibot

C2

http://globalex.uz/gg/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Surat_Penyerahan_PPH23_update_july_2020.pdf.exe

    • Size

      575KB

    • MD5

      13187746c5e3d526db4f5fa97218fc59

    • SHA1

      d8c4e08595fa4e16ac65bd619a8e701e10566a30

    • SHA256

      4dd20ae06b9a6d97087f3b7023bd68847640a6326d532029859472142cfbb9fb

    • SHA512

      c246b0dee145da8af8db8bff3486908b87f67469a4694317919ab0c58dc6aa59407163eb271f7773d3ba1ba2b78a1958f462dca70b5c568986a46fcac9a9d1ac

    • SSDEEP

      12288:ZPOuvPFClYKfrf9fN30Wvza5TQ9DwVYCc4qjx:ZGIPQYKT9lcxODgYTjx

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks