General

  • Target

    eba2a39642c4b7ce44b43e04056633e8_JaffaCakes118

  • Size

    603KB

  • Sample

    240410-wasyaaac61

  • MD5

    eba2a39642c4b7ce44b43e04056633e8

  • SHA1

    92b51c16963653de5e680643fee0e649f4d61ce1

  • SHA256

    dfbddd593573d22f463ddb6d75e59aa37dae2b7c130d81fb7a79c57457d7cab8

  • SHA512

    c4be4a541cfa74bf386289772e6c93ab38ea1429e55353ad52edc1a04ef21e6420a74207e2cc22c168463bf2e23ab27e163689d91ccc51fab36435994e5594dd

  • SSDEEP

    6144:G2DSTd3jw73/t0oBgpXZNa8TJ0ZIvY5OyHpBvyghefeVUTVokQyZGVbQlRxi/7ka:gdO3/XMPT05OyHpBvygTUxiyhoRkz5a

Malware Config

Extracted

Family

lokibot

C2

http://pualofficelogs.xyz/gg/bb/yes.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      eba2a39642c4b7ce44b43e04056633e8_JaffaCakes118

    • Size

      603KB

    • MD5

      eba2a39642c4b7ce44b43e04056633e8

    • SHA1

      92b51c16963653de5e680643fee0e649f4d61ce1

    • SHA256

      dfbddd593573d22f463ddb6d75e59aa37dae2b7c130d81fb7a79c57457d7cab8

    • SHA512

      c4be4a541cfa74bf386289772e6c93ab38ea1429e55353ad52edc1a04ef21e6420a74207e2cc22c168463bf2e23ab27e163689d91ccc51fab36435994e5594dd

    • SSDEEP

      6144:G2DSTd3jw73/t0oBgpXZNa8TJ0ZIvY5OyHpBvyghefeVUTVokQyZGVbQlRxi/7ka:gdO3/XMPT05OyHpBvygTUxiyhoRkz5a

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks