General

  • Target

    f46941afd8a1539eca653fc0cbf60d01_JaffaCakes118

  • Size

    938KB

  • Sample

    240416-1syzgafb6w

  • MD5

    f46941afd8a1539eca653fc0cbf60d01

  • SHA1

    9e0e595ababf557b3559d317988577d910f740e0

  • SHA256

    b1ef18cd742ec75c3c6a2b47662b903e30b23c090025c9acbc7a359d03fb0fbd

  • SHA512

    1c330a58d001b9dc2f3305ef33ce74d4675010c361774138d45735c7e865860b219f1adc20f5190496d0c0fcbdbdeb29c3157616e589061d173809a309671cc6

  • SSDEEP

    24576:rJNR9emt//dLIL7s74YlGOJuMk8qT3gZ5GKUd:qE74YkOJNRGKA

Malware Config

Extracted

Family

lokibot

C2

http://gtechcapital.com.ng/secure/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f46941afd8a1539eca653fc0cbf60d01_JaffaCakes118

    • Size

      938KB

    • MD5

      f46941afd8a1539eca653fc0cbf60d01

    • SHA1

      9e0e595ababf557b3559d317988577d910f740e0

    • SHA256

      b1ef18cd742ec75c3c6a2b47662b903e30b23c090025c9acbc7a359d03fb0fbd

    • SHA512

      1c330a58d001b9dc2f3305ef33ce74d4675010c361774138d45735c7e865860b219f1adc20f5190496d0c0fcbdbdeb29c3157616e589061d173809a309671cc6

    • SSDEEP

      24576:rJNR9emt//dLIL7s74YlGOJuMk8qT3gZ5GKUd:qE74YkOJNRGKA

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks