General

  • Target

    a7e46470a8dc38dad75ce82bc0a0df68_JaffaCakes118

  • Size

    604KB

  • Sample

    240818-x1k6ssshnr

  • MD5

    a7e46470a8dc38dad75ce82bc0a0df68

  • SHA1

    5a1e70d8c68ce445bbe5f06a97f13bddd621f973

  • SHA256

    5b46483a724fa7ce85a59dbc18d3c4994fae183a778db9452f0fd443d9f369ab

  • SHA512

    d1bd7a3061779f9cb465d3ca6976f805e5428f2b5e4389612567136b169fbd99ad4ef75ceb37d45431f5ac91fd4eef495b05ba3478c65d5bddaf15a9ead1e673

  • SSDEEP

    6144:yNAR3hk8i5iucP6eP9BcFZIf8gEW25CBUTHKXNvVyHU6cCZcG42MBwsWqcpxJ8WZ:yOjP6eP94bgEX5ENtyHDLMBws3Wlcd8

Malware Config

Extracted

Family

lokibot

C2

http://brokensoul.cf/Bobby/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a7e46470a8dc38dad75ce82bc0a0df68_JaffaCakes118

    • Size

      604KB

    • MD5

      a7e46470a8dc38dad75ce82bc0a0df68

    • SHA1

      5a1e70d8c68ce445bbe5f06a97f13bddd621f973

    • SHA256

      5b46483a724fa7ce85a59dbc18d3c4994fae183a778db9452f0fd443d9f369ab

    • SHA512

      d1bd7a3061779f9cb465d3ca6976f805e5428f2b5e4389612567136b169fbd99ad4ef75ceb37d45431f5ac91fd4eef495b05ba3478c65d5bddaf15a9ead1e673

    • SSDEEP

      6144:yNAR3hk8i5iucP6eP9BcFZIf8gEW25CBUTHKXNvVyHU6cCZcG42MBwsWqcpxJ8WZ:yOjP6eP94bgEX5ENtyHDLMBws3Wlcd8

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks