General

  • Target

    9568c0d01e18776fe76cd6e8b269666d_JaffaCakes118

  • Size

    519KB

  • Sample

    240814-kvd43stbme

  • MD5

    9568c0d01e18776fe76cd6e8b269666d

  • SHA1

    8e0b1b887167f8522fb050659685471db1c56b7a

  • SHA256

    31d2d46288e99c3c702b3302bb061c0cab77612e7ff9e5488bbd1e9099760be1

  • SHA512

    8d80a7a4772094f0d681c9908c6bd1777afc7889db1d5a1373992203f1add4f50e8fafa0fe3b0437ca5fd985fccfc037cd1785337098d3a7140f91da859ef259

  • SSDEEP

    12288:aMmrEMRPt1beVXvUuT0BT86aPnIpRiuLvgJMj1xrOUwwk:u/PtkUqAH5LvgijXk

Malware Config

Extracted

Family

lokibot

C2

http://byorn.us/kaka/kaka1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9568c0d01e18776fe76cd6e8b269666d_JaffaCakes118

    • Size

      519KB

    • MD5

      9568c0d01e18776fe76cd6e8b269666d

    • SHA1

      8e0b1b887167f8522fb050659685471db1c56b7a

    • SHA256

      31d2d46288e99c3c702b3302bb061c0cab77612e7ff9e5488bbd1e9099760be1

    • SHA512

      8d80a7a4772094f0d681c9908c6bd1777afc7889db1d5a1373992203f1add4f50e8fafa0fe3b0437ca5fd985fccfc037cd1785337098d3a7140f91da859ef259

    • SSDEEP

      12288:aMmrEMRPt1beVXvUuT0BT86aPnIpRiuLvgJMj1xrOUwwk:u/PtkUqAH5LvgijXk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks