General

  • Target

    e0e3dc1e417d5389764b3b9f246041d1_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240914-x972xs1hqp

  • MD5

    e0e3dc1e417d5389764b3b9f246041d1

  • SHA1

    0814d6b3631973965b2ca1d13fb11122cc8160d2

  • SHA256

    d7956dbf78484e9250bbc98bd1874a44d1b2a67b5a379f239a3fbe7fdf3e9769

  • SHA512

    036af199917afebcd05f5277a29630f6903b5c88a9857cd0aceacc7cf382bce6cad0d752f50d04e9317ddc92b1dbd3f3259fc9590df98d56e534244b0c616be0

  • SSDEEP

    3072:8Lr9xyY8b5Gz3pjaRjzdqLuF1hot1IknB0vLaCBcKK:wr3yY8w3pj2ki/hwCWCBcK

Malware Config

Extracted

Family

lokibot

C2

http://jaikhodiyargroup.com/js/5/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e0e3dc1e417d5389764b3b9f246041d1_JaffaCakes118

    • Size

      1.5MB

    • MD5

      e0e3dc1e417d5389764b3b9f246041d1

    • SHA1

      0814d6b3631973965b2ca1d13fb11122cc8160d2

    • SHA256

      d7956dbf78484e9250bbc98bd1874a44d1b2a67b5a379f239a3fbe7fdf3e9769

    • SHA512

      036af199917afebcd05f5277a29630f6903b5c88a9857cd0aceacc7cf382bce6cad0d752f50d04e9317ddc92b1dbd3f3259fc9590df98d56e534244b0c616be0

    • SSDEEP

      3072:8Lr9xyY8b5Gz3pjaRjzdqLuF1hot1IknB0vLaCBcKK:wr3yY8w3pj2ki/hwCWCBcK

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks