General

  • Target

    c1863c638fe81cf561e79d534b76196c_JaffaCakes118

  • Size

    1005KB

  • Sample

    240825-zcklgatcqh

  • MD5

    c1863c638fe81cf561e79d534b76196c

  • SHA1

    3ff7401565c3eafa22ef3de8066de3c586ab3ce8

  • SHA256

    57d7305667902e6c56234379a444aa3bc2738c9184e0c5f951e53cb4599e8a81

  • SHA512

    0d4bfc3b3713b5c310705432a709c5d9fc84bcf20fc04c18853551ae87b2be56c7163287d10f58f86b9a4d0d4c1a316a5eea88b04a4a7e2b2943e3e3394a1a73

  • SSDEEP

    24576:OsRWigkonvpv26Ayovf+QJRSTfsUtHaMm+:OCgVGywjJRNKHf

Malware Config

Extracted

Family

lokibot

C2

http://c2books.ru/som/fred.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c1863c638fe81cf561e79d534b76196c_JaffaCakes118

    • Size

      1005KB

    • MD5

      c1863c638fe81cf561e79d534b76196c

    • SHA1

      3ff7401565c3eafa22ef3de8066de3c586ab3ce8

    • SHA256

      57d7305667902e6c56234379a444aa3bc2738c9184e0c5f951e53cb4599e8a81

    • SHA512

      0d4bfc3b3713b5c310705432a709c5d9fc84bcf20fc04c18853551ae87b2be56c7163287d10f58f86b9a4d0d4c1a316a5eea88b04a4a7e2b2943e3e3394a1a73

    • SSDEEP

      24576:OsRWigkonvpv26Ayovf+QJRSTfsUtHaMm+:OCgVGywjJRNKHf

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks