General

  • Target

    c2601ddea155a9708f7f11820777cf79_JaffaCakes118

  • Size

    332KB

  • Sample

    240826-f93zjaxfph

  • MD5

    c2601ddea155a9708f7f11820777cf79

  • SHA1

    7f8fd1e5a1502323d2fe7da16876913790d59a4b

  • SHA256

    7c7aa4b7971c2ebd1ec1e02da2a30bc8bb13d6dddf7413da30dda3a3c471d625

  • SHA512

    7bae5ad297379a2f69502b8b26020795b2b84fa3ca70d1335bc1ffa1aed84b497ec4cd22e2f01830bfe6f9160739881939b89792250d99c54e8e6da708a6e597

  • SSDEEP

    6144:fLGWbWlpTfSDJIaIasBndRFJYg2Ff4T9iuwd58iSHH1a7TbHkEMm4:fLQpbS2hBdR8g84TIuw0DHVaLHGm4

Malware Config

Extracted

Family

lokibot

C2

http://37.157.192.93/css/m/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c2601ddea155a9708f7f11820777cf79_JaffaCakes118

    • Size

      332KB

    • MD5

      c2601ddea155a9708f7f11820777cf79

    • SHA1

      7f8fd1e5a1502323d2fe7da16876913790d59a4b

    • SHA256

      7c7aa4b7971c2ebd1ec1e02da2a30bc8bb13d6dddf7413da30dda3a3c471d625

    • SHA512

      7bae5ad297379a2f69502b8b26020795b2b84fa3ca70d1335bc1ffa1aed84b497ec4cd22e2f01830bfe6f9160739881939b89792250d99c54e8e6da708a6e597

    • SSDEEP

      6144:fLGWbWlpTfSDJIaIasBndRFJYg2Ff4T9iuwd58iSHH1a7TbHkEMm4:fLQpbS2hBdR8g84TIuw0DHVaLHGm4

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks