Resubmissions

21-09-2024 10:19

240921-mcrnkaxbpa 3

21-09-2024 10:18

240921-mb4azaxble 3

21-09-2024 09:56

240921-lytjlsweka 10

General

  • Target

    ef8bef7d1a8ae3ba7e8eb587d183c880_JaffaCakes118

  • Size

    407KB

  • Sample

    240921-lytjlsweka

  • MD5

    ef8bef7d1a8ae3ba7e8eb587d183c880

  • SHA1

    2dc7f3f967fd5616b866f7659cc5f748668a62cd

  • SHA256

    4f6a14fdfe1ed27721d7e8d09e9524240f912b85a29bc6ba76f6c60508b1e09c

  • SHA512

    5d8c5ed789c58699e7bcde0b8234193b733a415bc2a9bea7419239f120446303f969f4f08efcf8f814bbab000a9d9a542bf3d0ce8c10924d450344de5dbc4670

  • SSDEEP

    6144:x8I0ys1egkLahZpu7LpOSQvHPFrC+2F7h+D6/OuA5qR5E6KSpb6odrF9skA8r+R:x8I0ysYdLahIlavHN+57QC53+kA68

Malware Config

Extracted

Family

lokibot

C2

http://hfktichen.com/kaka/kaka4/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      MV Medi Aero IMO NO 9708966 00877 -xlxs.exe

    • Size

      434KB

    • MD5

      fe42b52214d984619bf7c42d73bc7980

    • SHA1

      4dd5052bbfcb6d37a636decae1d8bc03f5c355a7

    • SHA256

      98a050f19567bb930538a9656904f62036a9bee4f3f08c24463d6777cd87eabf

    • SHA512

      1f1ddf27221adff8884c239c85c35e8c1d2a0acefe7569bb4a1f7fa1815e37c095b5108a4fed08f465a99e593eaa8d0883af2946c4f531a57d5203f5ccc296d6

    • SSDEEP

      12288:sYKYjP6eP97rBuR0IXXp2ExYu3fOzVaoXXl8EkZO:d3jP6+7ronpJr3fQVNn

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks