General

  • Target

    ad7d7f4c9bb6f118eaeb64d69cce1393_JaffaCakes118

  • Size

    489KB

  • Sample

    240820-cj9gvaydke

  • MD5

    ad7d7f4c9bb6f118eaeb64d69cce1393

  • SHA1

    70babe9dcdf1850c2d1fe7300866cbe8513625d8

  • SHA256

    4c4420fc8167dc9d7a4bae0c3fc92ffd5bc3217e0c0eab1ba931cc1930233296

  • SHA512

    48be791eea9049517769978de24854acf17a5de511d23b9b7871ecfbb5d2b36119fe852a13dee1b3085ff5d0532d80624dd81dc47c354b7b19e99291dcc776f8

  • SSDEEP

    12288:8Fda+Fda7CbYQjoiuN3JO7EWCTT2AZnreZQAf:NCbYQjoBN3Jz5tr

Malware Config

Extracted

Family

lokibot

C2

http://51.195.53.221/p.php/9jOsfsOpZTcJM

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ad7d7f4c9bb6f118eaeb64d69cce1393_JaffaCakes118

    • Size

      489KB

    • MD5

      ad7d7f4c9bb6f118eaeb64d69cce1393

    • SHA1

      70babe9dcdf1850c2d1fe7300866cbe8513625d8

    • SHA256

      4c4420fc8167dc9d7a4bae0c3fc92ffd5bc3217e0c0eab1ba931cc1930233296

    • SHA512

      48be791eea9049517769978de24854acf17a5de511d23b9b7871ecfbb5d2b36119fe852a13dee1b3085ff5d0532d80624dd81dc47c354b7b19e99291dcc776f8

    • SSDEEP

      12288:8Fda+Fda7CbYQjoiuN3JO7EWCTT2AZnreZQAf:NCbYQjoBN3Jz5tr

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks