General

  • Target

    985b234a10b79ede6690e09e92973bad_JaffaCakes118

  • Size

    410KB

  • Sample

    240605-rfewdshc9w

  • MD5

    985b234a10b79ede6690e09e92973bad

  • SHA1

    ef8784716282e30366715b6232f5372ab5ccf1a0

  • SHA256

    972becbe534eb9c123a13abb463184baaa5068512bdf342d5dfd84b66a23a5c7

  • SHA512

    4acad23173dd92eb5cba7e44f33258747f88177d21ae3388ea5339acf98ec70291ccb78ee965a8add1b3eaa63c0536c80fdbb7d3b78f2ecc4575129a5b7084e5

  • SSDEEP

    6144:X8FfVTg9z1P9qNV8DPSawX0t6HS0vkIvHMeB7FlqrlN/vC3HlAOiu0w0YkfmikC:XIwR9YVsNiXfvttYpN/vC09

Malware Config

Extracted

Family

lokibot

C2

http://alhadin.nl/Loki/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      985b234a10b79ede6690e09e92973bad_JaffaCakes118

    • Size

      410KB

    • MD5

      985b234a10b79ede6690e09e92973bad

    • SHA1

      ef8784716282e30366715b6232f5372ab5ccf1a0

    • SHA256

      972becbe534eb9c123a13abb463184baaa5068512bdf342d5dfd84b66a23a5c7

    • SHA512

      4acad23173dd92eb5cba7e44f33258747f88177d21ae3388ea5339acf98ec70291ccb78ee965a8add1b3eaa63c0536c80fdbb7d3b78f2ecc4575129a5b7084e5

    • SSDEEP

      6144:X8FfVTg9z1P9qNV8DPSawX0t6HS0vkIvHMeB7FlqrlN/vC3HlAOiu0w0YkfmikC:XIwR9YVsNiXfvttYpN/vC09

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks