General

  • Target

    d1312b65ba8ce2d74ddfc859555105e5JaffaCakes118

  • Size

    1.0MB

  • Sample

    240907-pxqywawanj

  • MD5

    d1312b65ba8ce2d74ddfc859555105e5

  • SHA1

    2dbf52ac263e3577ba57645c1b364bef97baa3a6

  • SHA256

    616d536551a36dc7de21ef1945fba7edf919d6cf4bc14ddee3f983f1e55bbf74

  • SHA512

    c778708463d039f48bed2f9e597c19cef1f0bcdf3aa26fb69e3d279ac62187783d4e4552071f7503bd2f18129399c09f5f316b4d46feba9ed6b719346e72be4e

  • SSDEEP

    12288:c3lK8FluRs7Z8z4asvs1drdyImcHFebpvqgjoid2K046Mnq0UnsO5lJkKzUvoPUT:S9ZMRInpOdPZixK1q

Malware Config

Extracted

Family

lokibot

C2

http://136.243.159.53/~element/page.php?id=477

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d1312b65ba8ce2d74ddfc859555105e5JaffaCakes118

    • Size

      1.0MB

    • MD5

      d1312b65ba8ce2d74ddfc859555105e5

    • SHA1

      2dbf52ac263e3577ba57645c1b364bef97baa3a6

    • SHA256

      616d536551a36dc7de21ef1945fba7edf919d6cf4bc14ddee3f983f1e55bbf74

    • SHA512

      c778708463d039f48bed2f9e597c19cef1f0bcdf3aa26fb69e3d279ac62187783d4e4552071f7503bd2f18129399c09f5f316b4d46feba9ed6b719346e72be4e

    • SSDEEP

      12288:c3lK8FluRs7Z8z4asvs1drdyImcHFebpvqgjoid2K046Mnq0UnsO5lJkKzUvoPUT:S9ZMRInpOdPZixK1q

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks