General

  • Target

    fea47f49a11523967618642b6f20c64d_JaffaCakes118

  • Size

    242KB

  • Sample

    240929-qxwd2awflr

  • MD5

    fea47f49a11523967618642b6f20c64d

  • SHA1

    c8b39222a274184fec9468efbb4f4e25aa2ecdfd

  • SHA256

    9a5e10986c93f2ad50780938f9ccd96514a3584939d77bae42c3c6450cf5206a

  • SHA512

    f2ad433b2ad1151bd2ef1114dd9efe30ff36a97a90f4a1c84f2a6b5a5fc289c42cf98ea89c50ec64da2ea744705a00eef82a70635dc98a50ad4187f1b747e378

  • SSDEEP

    6144:ZkmlaGfG6KlWhdOopZ0HR69O27i6W/WcFiGFAOzbd:xlabC0oogTikGGOz

Malware Config

Extracted

Family

lokibot

C2

http://192.189.25.121/meown/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fea47f49a11523967618642b6f20c64d_JaffaCakes118

    • Size

      242KB

    • MD5

      fea47f49a11523967618642b6f20c64d

    • SHA1

      c8b39222a274184fec9468efbb4f4e25aa2ecdfd

    • SHA256

      9a5e10986c93f2ad50780938f9ccd96514a3584939d77bae42c3c6450cf5206a

    • SHA512

      f2ad433b2ad1151bd2ef1114dd9efe30ff36a97a90f4a1c84f2a6b5a5fc289c42cf98ea89c50ec64da2ea744705a00eef82a70635dc98a50ad4187f1b747e378

    • SSDEEP

      6144:ZkmlaGfG6KlWhdOopZ0HR69O27i6W/WcFiGFAOzbd:xlabC0oogTikGGOz

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks