General

  • Target

    714efaea0111306d7ed7f4fefc5793ba_JaffaCakes118

  • Size

    441KB

  • Sample

    240730-qqq6qs1ckj

  • MD5

    714efaea0111306d7ed7f4fefc5793ba

  • SHA1

    2918e1a1eec19baf0fd34f4a19671e2ad66b4e1e

  • SHA256

    f92c91f6aef77844a6f8a3bdefd114b72fe8dbca6f7cad5fffe82e0da737e1a2

  • SHA512

    536527fcc2a0f2c38d723356cb99099b1192feb9dcbf9002ecb09d1a205a5f1df984e4fa41c855eb2c8bf3d15efea5e8f736ff5016476c944e6b32aa29c22b3d

  • SSDEEP

    12288:Uwq2j+5vZZ6wAoVAFM0rgGyqP3sm6eP94j6bMNdK:lhjmvT68SFM0TyqPsm6+/

Malware Config

Extracted

Family

lokibot

C2

http://mflogistics-my.com/chief/har/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      714efaea0111306d7ed7f4fefc5793ba_JaffaCakes118

    • Size

      441KB

    • MD5

      714efaea0111306d7ed7f4fefc5793ba

    • SHA1

      2918e1a1eec19baf0fd34f4a19671e2ad66b4e1e

    • SHA256

      f92c91f6aef77844a6f8a3bdefd114b72fe8dbca6f7cad5fffe82e0da737e1a2

    • SHA512

      536527fcc2a0f2c38d723356cb99099b1192feb9dcbf9002ecb09d1a205a5f1df984e4fa41c855eb2c8bf3d15efea5e8f736ff5016476c944e6b32aa29c22b3d

    • SSDEEP

      12288:Uwq2j+5vZZ6wAoVAFM0rgGyqP3sm6eP94j6bMNdK:lhjmvT68SFM0TyqPsm6+/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks