General

  • Target

    8f90ffc48876fd292944bcf094a2af54_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240602-1thc4shd96

  • MD5

    8f90ffc48876fd292944bcf094a2af54

  • SHA1

    b5beb068a732277ee8bfc515a698cec1286864ef

  • SHA256

    b326044021db0ac4fd273e9c7747b4adac88e3ab9885859932ae30c6d2d4621e

  • SHA512

    1496dfd48e36d39e0479319d36b20e94e303b36287f2e32bc6c3289ca728630db15a01fee130d27ee587fbaace25b0450689588eac3028645777f1fddda58967

  • SSDEEP

    12288:a3HxvTzdIhHc6s6fvAHL8EIEgCPcuxWlsmP8H7zNA8vF0FBaYE9JtBUCuxiez0MS:a3x3S7s6fvAHa1eWnEb6+O36qCewMS

Malware Config

Extracted

Family

lokibot

C2

http://bixtoj.ga/92/5hom9/cat.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8f90ffc48876fd292944bcf094a2af54_JaffaCakes118

    • Size

      1.1MB

    • MD5

      8f90ffc48876fd292944bcf094a2af54

    • SHA1

      b5beb068a732277ee8bfc515a698cec1286864ef

    • SHA256

      b326044021db0ac4fd273e9c7747b4adac88e3ab9885859932ae30c6d2d4621e

    • SHA512

      1496dfd48e36d39e0479319d36b20e94e303b36287f2e32bc6c3289ca728630db15a01fee130d27ee587fbaace25b0450689588eac3028645777f1fddda58967

    • SSDEEP

      12288:a3HxvTzdIhHc6s6fvAHL8EIEgCPcuxWlsmP8H7zNA8vF0FBaYE9JtBUCuxiez0MS:a3x3S7s6fvAHa1eWnEb6+O36qCewMS

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks