General

  • Target

    8ad87cebd9aaadd8a385fa504863e532_JaffaCakes118

  • Size

    427KB

  • Sample

    240811-sjdceaygpc

  • MD5

    8ad87cebd9aaadd8a385fa504863e532

  • SHA1

    68e8214ff89b2c93f147bdc797889b25b85a2ee5

  • SHA256

    ef44e807ff152bb2c5f6ed11f573087872f0fdf1baaa0e31b7767c5723e503e7

  • SHA512

    53c88bce7495219b6b35bfaba1756ed04ba8ac9a05ededcd7752a4656369cf492d111b4b823c93e57ed41379eeb71e027446990e600216ba23ed427946201037

  • SSDEEP

    6144:IBb6rFigZaGASvJfbwhmxdPpndlNWrG9mx3Xf1pM4+h+0LX:IBGYgZTA+9bwUnwrGYrpZGL

Malware Config

Extracted

Family

lokibot

C2

https://www.ritcophysiotherapy.com.au/wap121/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8ad87cebd9aaadd8a385fa504863e532_JaffaCakes118

    • Size

      427KB

    • MD5

      8ad87cebd9aaadd8a385fa504863e532

    • SHA1

      68e8214ff89b2c93f147bdc797889b25b85a2ee5

    • SHA256

      ef44e807ff152bb2c5f6ed11f573087872f0fdf1baaa0e31b7767c5723e503e7

    • SHA512

      53c88bce7495219b6b35bfaba1756ed04ba8ac9a05ededcd7752a4656369cf492d111b4b823c93e57ed41379eeb71e027446990e600216ba23ed427946201037

    • SSDEEP

      6144:IBb6rFigZaGASvJfbwhmxdPpndlNWrG9mx3Xf1pM4+h+0LX:IBGYgZTA+9bwUnwrGYrpZGL

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks