General

  • Target

    ef4761cd6a71054b43acad6d713d7abb_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240921-hrx2nszfln

  • MD5

    ef4761cd6a71054b43acad6d713d7abb

  • SHA1

    ce962259fe5826ad17ac0fc7c98eccb811f9ce5d

  • SHA256

    fe974b02ead7c2e466973a042c8fa4a9779afdae0810ca538e6207465d470f3b

  • SHA512

    ac908867c86957411dfe3f138ffa26951b2684e0ac47a5e2f4c607a72305bb2581b4342f58820ee3ebc83a35df4c9a3a66542dc0e774c92882bc02bc9262017b

  • SSDEEP

    24576:NRgV9lX4ePztJzKe4QTnExJrP61c5sY1HVHTJxolLkXtVDJDhuecA7PGEWOrT4G/:NR6bbJR7Oyu5sw1NeLut/MAyVOr6k

Malware Config

Extracted

Family

lokibot

C2

http://pkiz.xyz/V3/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Extract_MK22AXX_SWIFT_98_2020.09.23.exe

    • Size

      1.8MB

    • MD5

      ccf8a20a1000a59693c36654ba595f7e

    • SHA1

      8f3f084c7f523af56769379f4529bb693c227863

    • SHA256

      7513ca9ae16b3dab78a70cd6c5ff6c58a3107256387a1db597e1c7945037e17b

    • SHA512

      696349aff3658e669cb44a1879d755109d2c9750c71505ace2bbd0ad383548f74fd11b7c0e83ea1984bd9b5e4b3082b50fed3f06fe3a2a5c0869a3e064b64dcc

    • SSDEEP

      24576:3RgV9lX4ePztJzKe4QTnExJrP61c5sY1HVHTJxolLkXtVDJDhuecA7PGEWOrT4Gr:3R6bbJR7Oyu5sw1NeLut/MAyVOr6kD

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks