General

  • Target

    4e07df2c057c3f144decf9af3409c471_JaffaCakes118

  • Size

    340KB

  • Sample

    240729-sgdkdstfnl

  • MD5

    4e07df2c057c3f144decf9af3409c471

  • SHA1

    8de9e8419666b5d1dc979964eaf0eea349a527f5

  • SHA256

    a43336d3a04f84125f7603032b543cdb794fe98f2b3e44dca0c3f241a83abc79

  • SHA512

    7c1b5a85b46f420fe7adb0ac0de67e37032171b6b9003624cf954dc87cc9161aeff9491ba95709e570d5dcbcfd2b17bd8b3592624513f9e71f9ea0c80bd5ad91

  • SSDEEP

    6144:wsojWjOtOXNkh1nEOyW6aHnnGtNPUJk9nKUy//NnFxU/7ReFUD:wseOXSfdZHn6umnKX/VnueFO

Malware Config

Extracted

Family

lokibot

C2

http://purinex.co.id/k2/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Invoice-MAJW-18-06-2020.PDF.exe

    • Size

      573KB

    • MD5

      7d3cd87b7ae39c73b72ede9413d7f2e2

    • SHA1

      d3f5aa9426b5ba1eaf0a79986bb2336bdc03f07c

    • SHA256

      2dd2cafba54d0f7610c085a225debb2297cbe70d95b65833f85a0d62cfda6a87

    • SHA512

      e3d21ef61bad84ab5a852dc707af444214110fc85508ce9ee79c74cfe2a5845866f615852875b6c7c2caa90a16869a777ac67063bb2736a1333522bd124721df

    • SSDEEP

      12288:EBRcXM3Uc4yEUdqhfwxgcQYRpS3hF6vbYfHFJsAicpr:oUBcxqhffV2vbWHFJ9

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks