General

  • Target

    5a0b8cc4f8405cb7226208f3e9dbb23c_JaffaCakes118

  • Size

    381KB

  • Sample

    240519-ppd94shc37

  • MD5

    5a0b8cc4f8405cb7226208f3e9dbb23c

  • SHA1

    cf79df3bf9b0c05e5bdebc7cad79e02784ad83fe

  • SHA256

    d2d4bbf8bd4167115e06607f72d01e100c8da83063f540e4c329d8bf6844a7b3

  • SHA512

    89a6a14d331e111bd8fe19e756e121b1f926cd3f3f6b475fb0a182fba4bafe778cd8a1c5d47499d1f2619c9875b307796adefd666e20372cac6d85e2cf1e59a1

  • SSDEEP

    6144:17IvKMHYvORhTlSbfD0auFQWtr8lD4bXWFG1tMqeA9jFgvAe7R/:dIvNHYvORh5EQFQWtIlDBFEeAQjN/

Malware Config

Extracted

Family

lokibot

C2

http://198.50.187.116/done/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5a0b8cc4f8405cb7226208f3e9dbb23c_JaffaCakes118

    • Size

      381KB

    • MD5

      5a0b8cc4f8405cb7226208f3e9dbb23c

    • SHA1

      cf79df3bf9b0c05e5bdebc7cad79e02784ad83fe

    • SHA256

      d2d4bbf8bd4167115e06607f72d01e100c8da83063f540e4c329d8bf6844a7b3

    • SHA512

      89a6a14d331e111bd8fe19e756e121b1f926cd3f3f6b475fb0a182fba4bafe778cd8a1c5d47499d1f2619c9875b307796adefd666e20372cac6d85e2cf1e59a1

    • SSDEEP

      6144:17IvKMHYvORhTlSbfD0auFQWtr8lD4bXWFG1tMqeA9jFgvAe7R/:dIvNHYvORh5EQFQWtIlDBFEeAQjN/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks