General

  • Target

    0718bbffbf7a4a1fbe38a21c43ec7159_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240429-h2ctgsdc22

  • MD5

    0718bbffbf7a4a1fbe38a21c43ec7159

  • SHA1

    230590949f6dcd4cdd588c4eca2740227894446f

  • SHA256

    bb9296118ee76e1b7e7a554fb34ed3cf0e82fd236eaa8aa8e9163cac20083d3e

  • SHA512

    33b669205619f3eff9e3ae61dedc80d3e671082165984557e94257e1689803be0b534ba7bac542fe0846a7712e044eb3cd39e5e9ee905d64ca00138b7ea5b024

  • SSDEEP

    24576:swCIF6fthwWh6ir/fIvn4TB445RLWZIOXPzUlXdaYJQSVjvxt:swCbthWW4v4645lssdBN

Malware Config

Extracted

Family

lokibot

C2

http://apolovapers.com/app/images/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      0718bbffbf7a4a1fbe38a21c43ec7159_JaffaCakes118

    • Size

      1.1MB

    • MD5

      0718bbffbf7a4a1fbe38a21c43ec7159

    • SHA1

      230590949f6dcd4cdd588c4eca2740227894446f

    • SHA256

      bb9296118ee76e1b7e7a554fb34ed3cf0e82fd236eaa8aa8e9163cac20083d3e

    • SHA512

      33b669205619f3eff9e3ae61dedc80d3e671082165984557e94257e1689803be0b534ba7bac542fe0846a7712e044eb3cd39e5e9ee905d64ca00138b7ea5b024

    • SSDEEP

      24576:swCIF6fthwWh6ir/fIvn4TB445RLWZIOXPzUlXdaYJQSVjvxt:swCbthWW4v4645lssdBN

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks