General

  • Target

    a64273950f4f986d22139c868bbb2aa3_JaffaCakes118

  • Size

    662KB

  • Sample

    240818-lh5xpszfpr

  • MD5

    a64273950f4f986d22139c868bbb2aa3

  • SHA1

    e9fc82bb74739807b85f9144ade9814ff6f9b076

  • SHA256

    fc5cec3c68ff338ec81cf836b56261b033e25f1fcf476d580544e653f5795835

  • SHA512

    14c47b7c5465ebdbcdcb70eef06080d8692c60cbb053aa054fdbe30763d66cfcf7f5086b06579002e06daf92782fbcb4b1b4419adf24b04b5b108317b522de7e

  • SSDEEP

    12288:1xojH5jdL/KyCR7PqRo2YQLa3RFC7cvoLTKdUJAPbBMy:IljBKnRIIQOhKcCTKaJAPbBZ

Malware Config

Extracted

Family

lokibot

C2

http://joovy.ga/akin/gate.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a64273950f4f986d22139c868bbb2aa3_JaffaCakes118

    • Size

      662KB

    • MD5

      a64273950f4f986d22139c868bbb2aa3

    • SHA1

      e9fc82bb74739807b85f9144ade9814ff6f9b076

    • SHA256

      fc5cec3c68ff338ec81cf836b56261b033e25f1fcf476d580544e653f5795835

    • SHA512

      14c47b7c5465ebdbcdcb70eef06080d8692c60cbb053aa054fdbe30763d66cfcf7f5086b06579002e06daf92782fbcb4b1b4419adf24b04b5b108317b522de7e

    • SSDEEP

      12288:1xojH5jdL/KyCR7PqRo2YQLa3RFC7cvoLTKdUJAPbBMy:IljBKnRIIQOhKcCTKaJAPbBZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks