General

  • Target

    c563b14e64a35861162fe200bc0c03c2_JaffaCakes118

  • Size

    270KB

  • Sample

    240827-vzshda1hqa

  • MD5

    c563b14e64a35861162fe200bc0c03c2

  • SHA1

    ae0aaaafa5f96564508d195d6042db6de9156472

  • SHA256

    d4d93d4f9418c3780969059d4c1aeae1273324bc6d1e8af74910593fd40659f8

  • SHA512

    0cda5fa67530a1a0aff0baad01b2262a2de023cc8cf463037578a6af5bc1bd695821f354fd24ebc85013bc01c4b28d066f2bd5b0db949e9057f005032e4963bd

  • SSDEEP

    6144:Kq0/xJqonjkYaScqOMGwckhXcJR1KiYaTu2segHWcbIuDB3TyF5:KNPwadObAhXcJ/7Y52fmMT

Malware Config

Extracted

Family

lokibot

C2

https://itweurotech.com/kobane/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PAYMENT INV.exe

    • Size

      590KB

    • MD5

      983601521176ceddddf5fc6142e8dbbc

    • SHA1

      962c55c211bdec3aa08990207ff80db1a6142b54

    • SHA256

      2005a7d48cf7e946fd3687933dceb9b8a06e2235508b4cda4d2e63a558da12fb

    • SHA512

      64f2869481460821ff91bd0425b6d47b9ecc15a16cf24883c7bd50cda56879f182168c931a0a928144f370dabadb0f1e73420de3efc6a9f904fec2c56e6f7773

    • SSDEEP

      12288:qE5TvcnBI9m5Xq+xQhCE6sP20iyyJc+ou:qqcBI9m5JQhCq+ou

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks