General

  • Target

    d3e48fa2186bf79f15777b9fdae745a0_JaffaCakes118

  • Size

    445KB

  • Sample

    240908-jstw3svbpq

  • MD5

    d3e48fa2186bf79f15777b9fdae745a0

  • SHA1

    cc50f9b20461d68e2d628dfdda47b6bdf8034f32

  • SHA256

    567aa66bc6af44cb50df99208bf8475be187b1b2cb5c2dabb45ca13424f86a5f

  • SHA512

    68988dd681ad008d51e0018b1a25bd067d22b9afca6c7906acaf5082a0275293317947507fbf0f1e358eb1a5ce5a2ec6cbc0b85512571286017b66e3a349b786

  • SSDEEP

    12288:3kuwXCTvUXHMnc0NTNFpoOD6LtoLQCwFlA:3UsXnJJFpHD+iL3wbA

Malware Config

Extracted

Family

lokibot

C2

https://duclongetc.com/b/need/work/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      889TeK5yVN72YbS.exe

    • Size

      519KB

    • MD5

      a82fe3286628c18a13d7101cf4ad9fa5

    • SHA1

      2431dcb0b3e8ee2c9c2e83ba97b60e2b436c8080

    • SHA256

      9c0ca340482798d9a62a26b8928e2bfcc20aee978a6b948d17d4a2c04c9adb0a

    • SHA512

      8fa386a25453469259fa9194c02530686e4087a58a22a5d7035826dcc15a70cd3c0aa0c68396f47c239f25ac915213c5df65ca5cb69776c61c596be54ef6840c

    • SSDEEP

      12288:B/iPhHqAkqf6tze5DwtZKFpUpXYD/YSqiAIPwURZM3/u8aj8g:qhKaf6tzfZ+zc

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks