General

  • Target

    c659f2d7758ca0320907b4fab1666300_JaffaCakes118

  • Size

    350KB

  • Sample

    240828-g6wxgsxhpa

  • MD5

    c659f2d7758ca0320907b4fab1666300

  • SHA1

    619662526b608bbe41cafc0603a26aba68dac872

  • SHA256

    d3142d091ef90e756c2d97c115ac048173ff385c3b625d45e9eba06afc3d5989

  • SHA512

    0d940deb3579debf34248c46934582fee2c224c17716bfa5f1f77e992093ab33ce0a883ad62da7f3ecb2db602193dc88c62a8b12268c174a47470d917d9eb2ba

  • SSDEEP

    6144:pPCganNBoDLl3S0sbvaIx69VHtmG6kbMYu6oXCkySMHnilPs9w7WqbGm:nan3oD5S5biIIVHtmDV7USWk

Malware Config

Extracted

Family

lokibot

C2

http://remzclot.ga/etc/main/l09/gold/home.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c659f2d7758ca0320907b4fab1666300_JaffaCakes118

    • Size

      350KB

    • MD5

      c659f2d7758ca0320907b4fab1666300

    • SHA1

      619662526b608bbe41cafc0603a26aba68dac872

    • SHA256

      d3142d091ef90e756c2d97c115ac048173ff385c3b625d45e9eba06afc3d5989

    • SHA512

      0d940deb3579debf34248c46934582fee2c224c17716bfa5f1f77e992093ab33ce0a883ad62da7f3ecb2db602193dc88c62a8b12268c174a47470d917d9eb2ba

    • SSDEEP

      6144:pPCganNBoDLl3S0sbvaIx69VHtmG6kbMYu6oXCkySMHnilPs9w7WqbGm:nan3oD5S5biIIVHtmDV7USWk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Target

      $APPDATA/labels/email-a-friend/_adm/51.opends60.dll

    • Size

      50B

    • MD5

      81d2e779daf6490730f4ad8a4baa6647

    • SHA1

      b8458bdd5ae0d00be7f52e1aeba25e260bc43202

    • SHA256

      15d85f4938b80699821f491e4a98695f8aca58bce9c5868ecc392a2bd48bc408

    • SHA512

      4513bee7d29cb72eb05a4ca95f86b6112c3af922f3fe29949682052c69f4409fdacd0e01d8d5ce69a55f34b2638e2aa9e6280e8855f235946d3628cc2149c59b

    Score
    1/10
    • Target

      $APPDATA/labels/email-a-friend/_adm/sbsiehost.dll

    • Size

      5KB

    • MD5

      1cf524d6a7e87af589b8d60a48eb4d2d

    • SHA1

      b87fdd028eac75346f8be8ba43e308f575dcc2de

    • SHA256

      22988f2381becff592dd11c42a6b680efacdefa9cd1f780742bca578505d14e1

    • SHA512

      cc87e463d28c506da52b21031b26e85bc644c5dbba3d822c61b08d871bc57724ecd0fbabc5bab3b2f35202305c04e029beeffd4dc207aec9024cf3dd0c6ef057

    • SSDEEP

      48:C0ytD8wh8fCfSuE4PY2k180rdoTNu+fUtZWNHWHlXPIBSsg5WWrn51m:7ytD83fC6u7g2crdONH6Wt0lPIBT0W8

    Score
    3/10
    • Target

      $TEMP/Stickinthemud.dll

    • Size

      44KB

    • MD5

      441254ab998d6ec5636622dd2b7ea539

    • SHA1

      6e6546776316ebf8e9039107ca1bc9b32705625a

    • SHA256

      26963ffdddd241f6d0f5d54824335afcc55705876708c238628e1fefe559f045

    • SHA512

      02c03ec58d5baa8b7b6804b161678582e317a52a4dfec07970dc44003a93e3e3d6f1cb17714bf406096c8b0d28ed7b0828ea5f7926f88722532114df4213d6f0

    • SSDEEP

      768:a2Cxhyh/wpK9lG3Pn+Meuh7DGnTED6xB3vyHTsU9MBacUB9G55:ixshihnnwRxEzdMUcUBM5

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Target

      $TEMP/m6_invoice/50.opends60.dll

    • Size

      53B

    • MD5

      fef6ff21091dd47c0613d0d3877e5bc9

    • SHA1

      da1674ed58ffcbb339c48c52bfdee85c27f2f4b9

    • SHA256

      340892ce705602d6c93c888dccd941a3ea9195f78d56d92952bae9c9d0476a53

    • SHA512

      d19fd56aadc1c95971c2373d8e47cfefe741066caf37cb326cbd65304dfc5f698a0381e1b882a8e53ca894b0f0908218bd1a8705ae33971aadc0e258ce14cff8

    Score
    1/10
    • Target

      $TEMP/m6_invoice/genasm.exe

    • Size

      44KB

    • MD5

      cea839e6bba49bf99a52b509d159e48e

    • SHA1

      0c2b9a457a117fa1301b3df40319f3031d8fafc8

    • SHA256

      b09d86e593968f6c4f9e03bba7a4cff9f714febe4e4fd5918fff4395ed12849a

    • SHA512

      964db677a323fc26c62d224b771f77e5e511cb16221e4faa129f101ef8a6191e03cac4012f70faa1aec72a59a78e4733c7268d3ccf3355681633e7416ab2c437

    • SSDEEP

      768:q+NZt3IP70NpPUyQqbkc40ZCOgOvd5Y1:qaU5xqbkn0Z4Ovd50

    Score
    3/10
    • Target

      $TEMP/m6_invoice/u2lsamp1.dll

    • Size

      21KB

    • MD5

      ccd8feed3d549bd78a2f76de4d721cd5

    • SHA1

      5161b82635d547642afd6712196c334e92547900

    • SHA256

      7fd9b7f2a88aae8a5adaad08b3b54e73d1bb980282538dbb2e6e54afd95ea5e3

    • SHA512

      2e2582ce204e129efc10e845b299efd652967484ef113e3486561dfbb883c847653c61c03eeb2503378e45a24aff5d6721d6ff78ff09eeb4337c1d0323e8f269

    • SSDEEP

      384:Y4BVub0hI8BJFsYkE+j6V3WKilfWLCcY9jBJJphf:jNFsYkE+eDmWL38TJ7

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks