General

  • Target

    b6b51be0520bfcaad93b457a441688e3_JaffaCakes118

  • Size

    346KB

  • Sample

    240617-evhvdatemg

  • MD5

    b6b51be0520bfcaad93b457a441688e3

  • SHA1

    0f66514f6d3bde763275fe00ece2e94dddbb5c17

  • SHA256

    cc3e2f7cc6f9ae027adfec912f9f5b0e940512b73bb3419f9db4ee9d6ac0a84d

  • SHA512

    6a65779ef2719e451f2467331cd21d74f00f08384756e5e86f719557cc294617f813cbf116bfded23d80cf058d72ba5ffe022156b334e2750c9d8c46f2bbbfd1

  • SSDEEP

    6144:qaJIiGfiGP4E2b7z/TU4QyAB6UeZSlxHL7sb/TwhhVYlgrsBgNLeoDaHCBMJPoa:qaJIiUizL/frk6xw7sbTwjVYIsBgNLeL

Malware Config

Extracted

Family

lokibot

C2

http://mygreencity.in/scripts/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PAYMENT_ADVICE NCB6290003457110200.exe

    • Size

      595KB

    • MD5

      38c3d61edf3f095d58a36a65ba15c8e8

    • SHA1

      7a86f2f6b648de12fe26d717dcb435a99393fc83

    • SHA256

      4ca9b45f58ea29095253e13f744267b11cb632aed3aad9e3e4abee0d153d9d38

    • SHA512

      b967b597140e16e58affc28152bd7009960dede4921801efd3397c26417cb1fe2285304d431f7e2a7467d9cf4c6f32671a108fa8de3cd01b529f4d4d58fcdc96

    • SSDEEP

      12288:VEv8FVujUpVTWgThfJ614X5p/iYHI0Oq8M0oko8ZiFhDF8KSpTTj/Xi0wbO/a3:VEEbuQ9WmD1HITPTnXi0wbqa3

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks