General

  • Target

    7e4562e0be997b4e5ed1a5c0b023c887_JaffaCakes118

  • Size

    766KB

  • Sample

    240731-2xpf9ssfmc

  • MD5

    7e4562e0be997b4e5ed1a5c0b023c887

  • SHA1

    a194bd8a5e589d7e8e04c4d7bd5bf778006bd491

  • SHA256

    083e098c7a4893abdbb906f03b92dda1f54c469527f2f59eafca8f1176d2686f

  • SHA512

    1ccca1135efaead3bbb866c318cf5f9a163131a3dada0450042994731084ced41ddd9836d608f11873e8bf1b62f56c2b9f227333bc3f84377d28805b6df95bfc

  • SSDEEP

    12288:E38ZC2jTIBwgM9poZThtKyx12lwLxog3rChBQhwIRP15XR+76iVbm:WfzBw3PotKWR9h3On6t1676Z

Malware Config

Extracted

Family

lokibot

C2

http://195.69.140.147/.op/cr.php/PGni9Nv586f9C

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7e4562e0be997b4e5ed1a5c0b023c887_JaffaCakes118

    • Size

      766KB

    • MD5

      7e4562e0be997b4e5ed1a5c0b023c887

    • SHA1

      a194bd8a5e589d7e8e04c4d7bd5bf778006bd491

    • SHA256

      083e098c7a4893abdbb906f03b92dda1f54c469527f2f59eafca8f1176d2686f

    • SHA512

      1ccca1135efaead3bbb866c318cf5f9a163131a3dada0450042994731084ced41ddd9836d608f11873e8bf1b62f56c2b9f227333bc3f84377d28805b6df95bfc

    • SSDEEP

      12288:E38ZC2jTIBwgM9poZThtKyx12lwLxog3rChBQhwIRP15XR+76iVbm:WfzBw3PotKWR9h3On6t1676Z

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks