General

  • Target

    b2a93e02e21a34d539d6d547a1261aec_JaffaCakes118

  • Size

    837KB

  • Sample

    240821-jrjdysxcrb

  • MD5

    b2a93e02e21a34d539d6d547a1261aec

  • SHA1

    c7e7e6fbf2d07a4f8c86c6124f35fde39431d9a4

  • SHA256

    93380d54665b9d9ccbda996d1ddd123b08ce9721cb5d15a92b273eba3873f399

  • SHA512

    2923b489e6969fb334c8b9850257ec72ce991eea94ae7ab59cc88394d6afdbda06a0cc977b7d8561cfd4040180f516fcc0a638d959f6e14d295c04e1aaa28b20

  • SSDEEP

    12288:N959ABbJ++mhtW7+0hKspElJ2+dy4q1WYsdBAqQRmErk9mZ8vJO8uPqxXAE2AZkt:RuBbJ+t+7+tspEzy4q4dP

Malware Config

Extracted

Family

lokibot

C2

http://51.195.53.221/p.php/qElaNgWyezEFV

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b2a93e02e21a34d539d6d547a1261aec_JaffaCakes118

    • Size

      837KB

    • MD5

      b2a93e02e21a34d539d6d547a1261aec

    • SHA1

      c7e7e6fbf2d07a4f8c86c6124f35fde39431d9a4

    • SHA256

      93380d54665b9d9ccbda996d1ddd123b08ce9721cb5d15a92b273eba3873f399

    • SHA512

      2923b489e6969fb334c8b9850257ec72ce991eea94ae7ab59cc88394d6afdbda06a0cc977b7d8561cfd4040180f516fcc0a638d959f6e14d295c04e1aaa28b20

    • SSDEEP

      12288:N959ABbJ++mhtW7+0hKspElJ2+dy4q1WYsdBAqQRmErk9mZ8vJO8uPqxXAE2AZkt:RuBbJ+t+7+tspEzy4q4dP

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks