General

  • Target

    c168a1ec781a5d8fb3721eced590c945_JaffaCakes118

  • Size

    856KB

  • Sample

    240825-x2arfszgme

  • MD5

    c168a1ec781a5d8fb3721eced590c945

  • SHA1

    4e4287edc588dcac05484f22eecbcf07ef5beeaa

  • SHA256

    1b1e8f0f724dd020ae8b5efde0e654b4e55b76d2f3c1cbbfa64eb5915ffa0fe2

  • SHA512

    bcd473304da4e2e3c0282243a821c823957f9a0034f3cfc978296d38e7661948fe489c97bf856e29ddcb6f558d9a6a7613f6f5d91d79867332f62e9401a7e45d

  • SSDEEP

    12288:6lhAE+ACQUoMbKAn6wRt+50pt78pUC8an8pUC8aUmrCGceRpDUmXL193Z1EXK:wvCQUoMbKK3Z8N8rdcMpDFL1Rw6

Malware Config

Extracted

Family

lokibot

C2

http://becharnise.ir/fa11/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c168a1ec781a5d8fb3721eced590c945_JaffaCakes118

    • Size

      856KB

    • MD5

      c168a1ec781a5d8fb3721eced590c945

    • SHA1

      4e4287edc588dcac05484f22eecbcf07ef5beeaa

    • SHA256

      1b1e8f0f724dd020ae8b5efde0e654b4e55b76d2f3c1cbbfa64eb5915ffa0fe2

    • SHA512

      bcd473304da4e2e3c0282243a821c823957f9a0034f3cfc978296d38e7661948fe489c97bf856e29ddcb6f558d9a6a7613f6f5d91d79867332f62e9401a7e45d

    • SSDEEP

      12288:6lhAE+ACQUoMbKAn6wRt+50pt78pUC8an8pUC8aUmrCGceRpDUmXL193Z1EXK:wvCQUoMbKK3Z8N8rdcMpDFL1Rw6

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks