General

  • Target

    ad6822fefc437413671ec31a510895ef_JaffaCakes118

  • Size

    419KB

  • Sample

    240820-b2y86a1dpp

  • MD5

    ad6822fefc437413671ec31a510895ef

  • SHA1

    12af1ff1f7caf223dfa9b46d9c33b5f58ff08381

  • SHA256

    c6b2131e763a3d14b60ba10036b88e586e7fc85598d219a9a743189a63bdb014

  • SHA512

    eec5490bccd7d17b7f32acb58b99650c1722f261e9c27c45b9594ae105f9fc787ced7c15ab88b033472932317a6a113d304177b0468eb5fe3a0eb11a72f41457

  • SSDEEP

    6144:o2+OW2RnZydXV08Lg4oGWD/91XNN4VFuabDhnd4fLchH8o0ck84Bc6mR3e:o2+A+BV0Nj95Vab1efLchc5cd4m3e

Malware Config

Extracted

Family

lokibot

C2

http://www.siyaghasourccing.com/sertoiu/fertuiop/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ad6822fefc437413671ec31a510895ef_JaffaCakes118

    • Size

      419KB

    • MD5

      ad6822fefc437413671ec31a510895ef

    • SHA1

      12af1ff1f7caf223dfa9b46d9c33b5f58ff08381

    • SHA256

      c6b2131e763a3d14b60ba10036b88e586e7fc85598d219a9a743189a63bdb014

    • SHA512

      eec5490bccd7d17b7f32acb58b99650c1722f261e9c27c45b9594ae105f9fc787ced7c15ab88b033472932317a6a113d304177b0468eb5fe3a0eb11a72f41457

    • SSDEEP

      6144:o2+OW2RnZydXV08Lg4oGWD/91XNN4VFuabDhnd4fLchH8o0ck84Bc6mR3e:o2+A+BV0Nj95Vab1efLchc5cd4m3e

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks