General

  • Target

    bd54ba15b12f9e0b4580904e572961e1_JaffaCakes118

  • Size

    1.2MB

  • Sample

    241203-pbdresvkhs

  • MD5

    bd54ba15b12f9e0b4580904e572961e1

  • SHA1

    45c591031e5b2b0bb0a1befb528bf7374f6f1fc5

  • SHA256

    0e5e7fc59e145c465ef13b673c34010fcd51325d9b05ba56f5ebadb450ea3bd0

  • SHA512

    8c9a9f5a800280fe8a24985096f35a88036a11c64059fdf3a6dfae37fa85a3b6db9c72e2c84deebac136848bcb9f35c3c5da5d480dcea4b398ca2ea648f2b53e

  • SSDEEP

    24576:VWnczSW8xUQFZnFlf/T54X+1JH/kYG1zFg4CyFV05ZOLaJ/5p:V8czSW2xjf/TI+rGpf05gaJ/r

Malware Config

Extracted

Family

lokibot

C2

http://eaglemechine.com/adm/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SCAN_2020305_14384990.scr

    • Size

      1.7MB

    • MD5

      730917b9f9972445ca54b505c853de95

    • SHA1

      fa6286e202ef441b03c4434e6087c65ba6aa4e2a

    • SHA256

      85372ad7e7596961332805ed270036aa63a776482f46e143c301921bbcaed95e

    • SHA512

      0874f6f9759cdcf389dc5f642e9cbff11d3dcc6e7172bdd13a964eaf32950f0670e797c350b4cccb34ce892ee823bf20fe6fd5f43288bc924ac2e72ac4c0ec07

    • SSDEEP

      24576:4tb20pkaCqT5TBWgNQ7aMSMfCxqn/+TkavB2EgRLBFlvEp4MlI6A:BVg5tQ7aMRCkmT3Bpg3PvEE5

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks