General

  • Target

    b3e2bc81a696e942b800607a112d91f4_JaffaCakes118

  • Size

    548KB

  • Sample

    240821-r4sr6axfnm

  • MD5

    b3e2bc81a696e942b800607a112d91f4

  • SHA1

    2f2c138790f2c2d75bee234f20d274b28fcde2d2

  • SHA256

    f8b40e07b30fcc847a2755047e26635fd37209031f9d202a5d5535dcf7a78b0a

  • SHA512

    878624a2b455362dcc6e2212bf0cbd0822fb4ed7aa86014b7eeb498054f21ed7c0b76e6640e230018b66daf21d8895edbd872578f25981c0b14a99b9dda3839f

  • SSDEEP

    12288:ifO+sI1xGbhU9p+L+eQpWeb9D4lpCztrq5tsUdX:iWMvGSC4WMklqU

Malware Config

Extracted

Family

lokibot

C2

http://www.sanibath.com/wp-content/upgrade/files/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b3e2bc81a696e942b800607a112d91f4_JaffaCakes118

    • Size

      548KB

    • MD5

      b3e2bc81a696e942b800607a112d91f4

    • SHA1

      2f2c138790f2c2d75bee234f20d274b28fcde2d2

    • SHA256

      f8b40e07b30fcc847a2755047e26635fd37209031f9d202a5d5535dcf7a78b0a

    • SHA512

      878624a2b455362dcc6e2212bf0cbd0822fb4ed7aa86014b7eeb498054f21ed7c0b76e6640e230018b66daf21d8895edbd872578f25981c0b14a99b9dda3839f

    • SSDEEP

      12288:ifO+sI1xGbhU9p+L+eQpWeb9D4lpCztrq5tsUdX:iWMvGSC4WMklqU

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks