General

  • Target

    c0e8c3c45c6fe75f64956965aefef295_JaffaCakes118

  • Size

    253KB

  • Sample

    240825-rggflszdnk

  • MD5

    c0e8c3c45c6fe75f64956965aefef295

  • SHA1

    af07540efd80a42b2492dc666c8b45646fd92b52

  • SHA256

    cffc342e49490e55a368dba2ae0e5124c3d94e199367fce23dbaadcfee51d0fa

  • SHA512

    732f8ab1427889eef5434e2f6cd3e542aa2f45eeb28195f622f14fba551ab5b70e5e16dbb0b899e2a68b5f8913fe49833bc59b7bff092d0defa5a46857f0ded3

  • SSDEEP

    6144:YwdNXEgmPAvS8H7JEwt7NI5nAWNFPob7PTbR8sMPM/ibqM:YSEgpSCJEa74nVFq7bR8lM6bB

Malware Config

Extracted

Family

lokibot

C2

http://shungkargo.com/hoist/logs/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Revised PO#81223 , PDF.exe

    • Size

      313KB

    • MD5

      973007d44df8a46739d13b6946b05495

    • SHA1

      dc916bd9de4c19fc353d5efb3113afea0deb6b92

    • SHA256

      43f445c8c772ea30a95c69331da3113f550ad3b3e5d5b6d234d8fd8457b38d16

    • SHA512

      456de8d86ea0064318d8c4d0eb70b7614520672ad86dbf0f37891ed9dc458c9623b59edc5cfeaf0fe2066ddde2ac50f12ea21b834a497e44fd6e3fa26c683d3f

    • SSDEEP

      6144:CFXuNXQQW6LJS5dVNK+4kGzA2WI7NQyJS1LRXXn2b5847:qu66LJSpNNW9WI7GLRXX2n

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks