General

  • Target

    a8b4e16520729aab19cb3af75e1bb465_JaffaCakes118

  • Size

    841KB

  • Sample

    240818-3qavzavdkl

  • MD5

    a8b4e16520729aab19cb3af75e1bb465

  • SHA1

    e374f4e8c3073703e9f7703d4ee6fbbf34e8cf29

  • SHA256

    a63764d5e9fbc00ed4cfeaa26b54241ec413134bbc389a0305477f6d45c2cd2e

  • SHA512

    731c0a0b975830a8656f15841b27b7a07cd835aa152f86ddb81513aea4ce81f692a359a359723dc229badcfcecaa25500ec924803b4b510c12e5e4b7aa24d55e

  • SSDEEP

    12288:v1G2mgEFKsIHLJ+lyMziSR9De65ASncRoLoXTerDoFJTO187DuFx62eXrDrcBxL2:MFKLriziS1NtoqrcTO8yx624rcrhd

Malware Config

Extracted

Family

lokibot

C2

http://51.195.53.221/p.php/UXzOJYiOV7I83

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a8b4e16520729aab19cb3af75e1bb465_JaffaCakes118

    • Size

      841KB

    • MD5

      a8b4e16520729aab19cb3af75e1bb465

    • SHA1

      e374f4e8c3073703e9f7703d4ee6fbbf34e8cf29

    • SHA256

      a63764d5e9fbc00ed4cfeaa26b54241ec413134bbc389a0305477f6d45c2cd2e

    • SHA512

      731c0a0b975830a8656f15841b27b7a07cd835aa152f86ddb81513aea4ce81f692a359a359723dc229badcfcecaa25500ec924803b4b510c12e5e4b7aa24d55e

    • SSDEEP

      12288:v1G2mgEFKsIHLJ+lyMziSR9De65ASncRoLoXTerDoFJTO187DuFx62eXrDrcBxL2:MFKLriziS1NtoqrcTO8yx624rcrhd

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks