General

  • Target

    abc0d06ccfec621ddf30022bf7d252ae_JaffaCakes118

  • Size

    659KB

  • Sample

    240819-t2r4ysybmj

  • MD5

    abc0d06ccfec621ddf30022bf7d252ae

  • SHA1

    7bffccb1cf10b8239be30380dadd1e782ada4727

  • SHA256

    8f8b737cb257334806ab6ed42f9597765b86c578223fea359a24342e76e57005

  • SHA512

    3f36d74acb929f18c9d39c4f91313a393754d44fbba8ca2feb11206fdd2e8c3790a664e68034999dc8d5dc8cf26e70a437bedc78c2e356e4248bdb5fb1675e49

  • SSDEEP

    12288:X1eRRAfxCIUnyNOI/SN/HWQZUpiXnZ4GfBg:liRO8nyNOI0u7EJffy

Malware Config

Extracted

Family

lokibot

C2

http://joovy.ga/akin/gate.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      abc0d06ccfec621ddf30022bf7d252ae_JaffaCakes118

    • Size

      659KB

    • MD5

      abc0d06ccfec621ddf30022bf7d252ae

    • SHA1

      7bffccb1cf10b8239be30380dadd1e782ada4727

    • SHA256

      8f8b737cb257334806ab6ed42f9597765b86c578223fea359a24342e76e57005

    • SHA512

      3f36d74acb929f18c9d39c4f91313a393754d44fbba8ca2feb11206fdd2e8c3790a664e68034999dc8d5dc8cf26e70a437bedc78c2e356e4248bdb5fb1675e49

    • SSDEEP

      12288:X1eRRAfxCIUnyNOI/SN/HWQZUpiXnZ4GfBg:liRO8nyNOI0u7EJffy

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks