General

  • Target

    531b89dee77e2811b33b0ad016207e2d_JaffaCakes118

  • Size

    4.3MB

  • Sample

    240518-fh6lcacg36

  • MD5

    531b89dee77e2811b33b0ad016207e2d

  • SHA1

    2943afc9e5559f24e5b557e2fc9019d298340dab

  • SHA256

    201bc32dcfeb4f8b3dd057122a3a08499d197552a80c4c70268b27d36236b9c5

  • SHA512

    649e231e5255f325b83647c2767857cb9f3ab662e1637ac530851ef5e210393935b2c1fdaf9e6efee2040e2625baa09ea6e5c03e9a69b0d4bc7667fbd9ce246e

  • SSDEEP

    12288:6wPXU2HaaToM01lhNj2ipagNj2ipagNj2ipagNj2ipagNj2ipagNj2ipagNj2ip2:6wXU2HaarMelllllllt

Malware Config

Extracted

Family

lokibot

C2

http://tcoolonline.mobi/wp-admin/css/colors/blue/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      531b89dee77e2811b33b0ad016207e2d_JaffaCakes118

    • Size

      4.3MB

    • MD5

      531b89dee77e2811b33b0ad016207e2d

    • SHA1

      2943afc9e5559f24e5b557e2fc9019d298340dab

    • SHA256

      201bc32dcfeb4f8b3dd057122a3a08499d197552a80c4c70268b27d36236b9c5

    • SHA512

      649e231e5255f325b83647c2767857cb9f3ab662e1637ac530851ef5e210393935b2c1fdaf9e6efee2040e2625baa09ea6e5c03e9a69b0d4bc7667fbd9ce246e

    • SSDEEP

      12288:6wPXU2HaaToM01lhNj2ipagNj2ipagNj2ipagNj2ipagNj2ipagNj2ipagNj2ip2:6wXU2HaarMelllllllt

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks