General

  • Target

    f5ee0c1e0e3dce98edc75024d9dc0d8a_JaffaCakes118

  • Size

    754KB

  • Sample

    240417-q8kfxaag22

  • MD5

    f5ee0c1e0e3dce98edc75024d9dc0d8a

  • SHA1

    88a12fc23d3563d7b3077111da551fc00fbb464a

  • SHA256

    bc3155d96b1b3ea6a925a96ab13abec98fd056b75adbc4ff2a802ac8fda7e6c8

  • SHA512

    e8ea09ba2d87259ebdf7c6446d56d2e14627e536c5f707edb26427e754a091093763bae9f4101b7e839c570a04151aa6139b5938059145fbb35a4691f6544272

  • SSDEEP

    12288:eMrP7w67yniLV+5uxcgXNywAGL5kYd+DljpM3AumFH35K6DCmZ7mo5oFCEkvH:xrP7wPniLV+5scgdUG9/Ot7mo5oFCEkv

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd14/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f5ee0c1e0e3dce98edc75024d9dc0d8a_JaffaCakes118

    • Size

      754KB

    • MD5

      f5ee0c1e0e3dce98edc75024d9dc0d8a

    • SHA1

      88a12fc23d3563d7b3077111da551fc00fbb464a

    • SHA256

      bc3155d96b1b3ea6a925a96ab13abec98fd056b75adbc4ff2a802ac8fda7e6c8

    • SHA512

      e8ea09ba2d87259ebdf7c6446d56d2e14627e536c5f707edb26427e754a091093763bae9f4101b7e839c570a04151aa6139b5938059145fbb35a4691f6544272

    • SSDEEP

      12288:eMrP7w67yniLV+5uxcgXNywAGL5kYd+DljpM3AumFH35K6DCmZ7mo5oFCEkvH:xrP7wPniLV+5scgdUG9/Ot7mo5oFCEkv

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks