General

  • Target

    ba108b1ed946453532f4632d02fb9bc7_JaffaCakes118

  • Size

    258KB

  • Sample

    240823-c93f8aterr

  • MD5

    ba108b1ed946453532f4632d02fb9bc7

  • SHA1

    7d07b4487141595d562dfb11c41457f4a5f0c47d

  • SHA256

    3f718387641b0b832e86db8faa2ccabb1ab1087b5d93cca5c9ae25fc3f9c429e

  • SHA512

    2937558aec8d15b8e75f3af8ad886ce5302d25078c96e16456539a437c6294c0bd609b917cecf181b01449935e98d3942fb230148e352d0d67b2eb7092c66e8a

  • SSDEEP

    6144:w2Q3nxxYrgHZ92LEfhpAY1u6N27piWqxPfIHMPQC/zvTk:YCgHZ9LJ2P7pStkCLvI

Malware Config

Extracted

Family

lokibot

C2

http://keltoppsss.tk/panel/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ba108b1ed946453532f4632d02fb9bc7_JaffaCakes118

    • Size

      258KB

    • MD5

      ba108b1ed946453532f4632d02fb9bc7

    • SHA1

      7d07b4487141595d562dfb11c41457f4a5f0c47d

    • SHA256

      3f718387641b0b832e86db8faa2ccabb1ab1087b5d93cca5c9ae25fc3f9c429e

    • SHA512

      2937558aec8d15b8e75f3af8ad886ce5302d25078c96e16456539a437c6294c0bd609b917cecf181b01449935e98d3942fb230148e352d0d67b2eb7092c66e8a

    • SSDEEP

      6144:w2Q3nxxYrgHZ92LEfhpAY1u6N27piWqxPfIHMPQC/zvTk:YCgHZ9LJ2P7pStkCLvI

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks