General

  • Target

    3b99b7ad44158bb1a6a3692c5c7fe141_JaffaCakes118

  • Size

    488KB

  • Sample

    240729-htjxtssbje

  • MD5

    3b99b7ad44158bb1a6a3692c5c7fe141

  • SHA1

    3c8dd20aa5c958985684768b84eaf3a9eb338df8

  • SHA256

    621be60fa8bff2b5213da684f43a00e25eb9f379f80e64f9ca85cad70dece42b

  • SHA512

    bcf1688f2989811ba968e93e3c4277675c42a147769dd9a833652384c241fb0e4998ccefb3a94c16cbb2991c2ddf0ac03266fb4e2472e614be421aad14fa27ab

  • SSDEEP

    6144:yLmT89QO9uFWw7xcG19FIWTyF+m9vpUesKQ28yZHjH9xQQJXyiLgla/bako4y:oZG++ruF+UUei2rdlXyegsPo/

Malware Config

Extracted

Family

lokibot

C2

http://babaseoa.com/cartel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      3b99b7ad44158bb1a6a3692c5c7fe141_JaffaCakes118

    • Size

      488KB

    • MD5

      3b99b7ad44158bb1a6a3692c5c7fe141

    • SHA1

      3c8dd20aa5c958985684768b84eaf3a9eb338df8

    • SHA256

      621be60fa8bff2b5213da684f43a00e25eb9f379f80e64f9ca85cad70dece42b

    • SHA512

      bcf1688f2989811ba968e93e3c4277675c42a147769dd9a833652384c241fb0e4998ccefb3a94c16cbb2991c2ddf0ac03266fb4e2472e614be421aad14fa27ab

    • SSDEEP

      6144:yLmT89QO9uFWw7xcG19FIWTyF+m9vpUesKQ28yZHjH9xQQJXyiLgla/bako4y:oZG++ruF+UUei2rdlXyegsPo/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks