General

  • Target

    754cecba9022cd223e85616a62e55048_JaffaCakes118

  • Size

    683KB

  • Sample

    241024-3l6f3sxgpa

  • MD5

    754cecba9022cd223e85616a62e55048

  • SHA1

    893ef3f24fc567ceee6c26ffff8ccdb89677e6fc

  • SHA256

    ae5613f24c71abd3b7e9c263bb37eaffab6c4b859e2264709f31e4db88df803d

  • SHA512

    5fc59afaf949946adf911552b3a150ba8ffa4ebec9ca3d90b8de875043777f22a98e440f524878595120385ff7f5b7bf5c59945b501a1bf674369bdea62a8d9d

  • SSDEEP

    12288:xEz6HK7zH7vXOXfJG/101DOky96cFNvy2NHSevEPs/i8Y9BWXR:mzpT7f2JGd01V46celpPs/w9w

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/W6WAeRBLKcGxR

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      754cecba9022cd223e85616a62e55048_JaffaCakes118

    • Size

      683KB

    • MD5

      754cecba9022cd223e85616a62e55048

    • SHA1

      893ef3f24fc567ceee6c26ffff8ccdb89677e6fc

    • SHA256

      ae5613f24c71abd3b7e9c263bb37eaffab6c4b859e2264709f31e4db88df803d

    • SHA512

      5fc59afaf949946adf911552b3a150ba8ffa4ebec9ca3d90b8de875043777f22a98e440f524878595120385ff7f5b7bf5c59945b501a1bf674369bdea62a8d9d

    • SSDEEP

      12288:xEz6HK7zH7vXOXfJG/101DOky96cFNvy2NHSevEPs/i8Y9BWXR:mzpT7f2JGd01V46celpPs/w9w

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks