General

  • Target

    da18bd8764bf1b99189d6abe9021ea38_JaffaCakes118

  • Size

    348KB

  • Sample

    240911-lx6sjstfjk

  • MD5

    da18bd8764bf1b99189d6abe9021ea38

  • SHA1

    f3b6ac12a9d6eb2db40a7d905a97a88f6f959190

  • SHA256

    f0a0be0758348985361b10033d297d2d2b3244b3989bf292545014e08a35dd86

  • SHA512

    df54dc690cd7dfc3b47fafd6435f77cea6a9a517f646d644ccaa85373bd271b9e5a041364ab485f16b4594e3ad80347a9070076ee74705cb71fa1689798c5462

  • SSDEEP

    6144:MXFRaV6K+83QEy33WiKdhJrEFsrf7glHaXHH4HOa3/uvXWGQMuCYK:MVR5h83Py3mzWFOD3OqXQMzJ

Malware Config

Extracted

Family

lokibot

C2

http://apoxnew.com/prexi/pin.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      FZC-11573.exe

    • Size

      571KB

    • MD5

      1ee969a77677757bd39206a9aeb49cc2

    • SHA1

      e1ea51e11ac68a9ecc5c6b508fe4827372055f8a

    • SHA256

      89f071e1363149bb86804389d3d144b71de15b92bedd3fca7f79c47297f0d6aa

    • SHA512

      80135bdae6d8bc75a5269ae959abb8d544ad378025cb8c0e66323ba081ab7ab954603c08251263162a67adac24712d59cc1a99b1667653309ef093b82df841c1

    • SSDEEP

      12288:Ensaz6hrdmMrkr8w8ha0PBJ8FSocI87mNsOep38370cQCuZ710:OsCEzkiwOMFSxNaeOe0wcCe

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks