General

  • Target

    1601fd5152f9fa9551c0c61fb208ebb7_JaffaCakes118

  • Size

    182KB

  • Sample

    240627-pnk19steln

  • MD5

    1601fd5152f9fa9551c0c61fb208ebb7

  • SHA1

    ff9a3397ce9d5892764259555c4c58ebbdcc47aa

  • SHA256

    c359fd0f9dac8f4af2962f21260dd4661fc27a7d787e1e6c7a71dc056b95071e

  • SHA512

    10415c15333a029db1d8946914513f7de382bc59a26538c8812a5dc190c71cc63db4e387debc47d658758a49589b9c3f8ef5427568743c1e487374365a8c9f17

  • SSDEEP

    3072:yWXiRLOS4/mjVkdfuU0CYDSPeur7MSx5PfLItnemS/IrJXkP+U7FaliJh5Hzws3O:yWS9KOVkc8eu7hx5PMtemSwrJXkP378L

Malware Config

Extracted

Family

lokibot

C2

https://lokipanelhostingpanel.gq/panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      1601fd5152f9fa9551c0c61fb208ebb7_JaffaCakes118

    • Size

      182KB

    • MD5

      1601fd5152f9fa9551c0c61fb208ebb7

    • SHA1

      ff9a3397ce9d5892764259555c4c58ebbdcc47aa

    • SHA256

      c359fd0f9dac8f4af2962f21260dd4661fc27a7d787e1e6c7a71dc056b95071e

    • SHA512

      10415c15333a029db1d8946914513f7de382bc59a26538c8812a5dc190c71cc63db4e387debc47d658758a49589b9c3f8ef5427568743c1e487374365a8c9f17

    • SSDEEP

      3072:yWXiRLOS4/mjVkdfuU0CYDSPeur7MSx5PfLItnemS/IrJXkP+U7FaliJh5Hzws3O:yWS9KOVkc8eu7hx5PMtemSwrJXkP378L

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Modifies WinLogon for persistence

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks