General

  • Target

    cdcd77ea53a656fa3e052272a0e88638_JaffaCakes118

  • Size

    583KB

  • Sample

    240831-3g4rpasajg

  • MD5

    cdcd77ea53a656fa3e052272a0e88638

  • SHA1

    6d05ee7745245095e088f9871490d88605ddc581

  • SHA256

    56ac19a70d4e0ba078695492e58631de22c97057540c4615270154d74c5cce11

  • SHA512

    6df34ece49f63b75445136410bbbbcd6d518575bbaa9fbdad1211d2b8129df1b99535928c3ca213be399a5fc4e34e54949ce926972beed2c9657c3918f53e6f0

  • SSDEEP

    12288:O03Vx8W34SKn6T3Erc5Ai4CvGq4ZMwfC/h:O03Ztq6T3E3i4/8cqh

Malware Config

Extracted

Family

lokibot

C2

http://hfktichen.com/kaka/kaka4/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Shipment-kpi6eBCIyqPVOpz-pdf.exe

    • Size

      749KB

    • MD5

      c86fb2f514656d669912d6c131e26950

    • SHA1

      c1746fedcf8ff893132a863b38fe4c2f5cecce4e

    • SHA256

      68830a24fb818aea27e54e97f4dec890d751166eecb7c02ea3cb03c823e5fe65

    • SHA512

      0ad068cfe205bdcf57c68cd377a19b33f9329100b51b812e573d727e438381f1960b601c2e4c599252285ae41d0506e1cb9f8921d87196235b5c19482c57e569

    • SSDEEP

      12288:KyBCN4jP6eP9teG8WbESKnQTrEtm5ii+CvuM4Z4wNC/:KyBCGjP6+tekRqQTrEHi+xScq

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks