General

  • Target

    d5c14755ab1a260c050bb032aea779e3_JaffaCakes118

  • Size

    305KB

  • Sample

    240909-gqfwbsxcnh

  • MD5

    d5c14755ab1a260c050bb032aea779e3

  • SHA1

    2b7c44b92d3bf9c624735f36779d85fa288c4c95

  • SHA256

    ec4692078fd68aa0cca67a1d8715fdc29c2577b3df083f77f04370b4f67317cb

  • SHA512

    a1e9eb668e0bb14a7bce85f51f32b86ef33a810496bc080eea32b7a9961e17b92ac5d06343045c8fce57f80522908f7e108d2aebcb02a18453669901b223aa18

  • SSDEEP

    6144:zViUoQOgcsNLVK26SkSId67nEBbho9IuZyUu9kSW0X5sJxJ2Zxe:ZomcWVnjE09IsPu9dJcn2Zxe

Malware Config

Extracted

Family

lokibot

C2

http://195.69.140.147/.op/cr.php/b8ZlD3atg0TYU

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      000005067_04977188.exe

    • Size

      563KB

    • MD5

      d0a302425fa89ea4a42caccaba7cd84e

    • SHA1

      ec4bdd62e04932ef5d1942ec33ef97a9d7848833

    • SHA256

      8a0795afe89fe36a1ee16af973575015106814aa2e4421050f9ec1fca3be9887

    • SHA512

      ea95b07d25e817e6d28b5cc9fd20ea81f351bc790a94a50fc2226f0e0b34f1fe5d752f087bab25ff3d7f7b29596f0866945b3a7d6e36d00f60fb26e7ee720844

    • SSDEEP

      6144:Np3UqQO+cs9L3K26Sk0IdU7nEnbhgvSuZJHgiWpiADnLhwDckjQI1mnKiN:NjAcU3nHEivSsJHgrpiADyckjQc

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks