General

  • Target

    7bb3052b07bd9840901360aac5a9146e_JaffaCakes118

  • Size

    363KB

  • Sample

    240731-h6xdpaxepb

  • MD5

    7bb3052b07bd9840901360aac5a9146e

  • SHA1

    d8406b01bbed04d6337f4e44a869d46a069e2caf

  • SHA256

    54c4c4683dbba7dca7c61d6083eefbfb8a9a74c203d74f9bead25f9d5d4174eb

  • SHA512

    8cd82cbe0acd7d3f9204ca5b3145cd07c6038153b4000ac1557b39487896d67bd5dd581cbc4e8371c73aeb063f4786726685f899a268e99b87588a602c75667f

  • SSDEEP

    6144:OSMFdYeD3v9mtL5UF4NqmPPJLum11x674jaId6AF3NBUMaQ0tdi+eaKvIm6EOh0r:OSMFdpvYtaFaq8ry7Z/WdLFMiVLvIm66

Malware Config

Extracted

Family

lokibot

C2

http://www.siyaghasourccing.com/sertoiu/fertuiop/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7bb3052b07bd9840901360aac5a9146e_JaffaCakes118

    • Size

      363KB

    • MD5

      7bb3052b07bd9840901360aac5a9146e

    • SHA1

      d8406b01bbed04d6337f4e44a869d46a069e2caf

    • SHA256

      54c4c4683dbba7dca7c61d6083eefbfb8a9a74c203d74f9bead25f9d5d4174eb

    • SHA512

      8cd82cbe0acd7d3f9204ca5b3145cd07c6038153b4000ac1557b39487896d67bd5dd581cbc4e8371c73aeb063f4786726685f899a268e99b87588a602c75667f

    • SSDEEP

      6144:OSMFdYeD3v9mtL5UF4NqmPPJLum11x674jaId6AF3NBUMaQ0tdi+eaKvIm6EOh0r:OSMFdpvYtaFaq8ry7Z/WdLFMiVLvIm66

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks