General

  • Target

    c4a66759f1e79cd39c53f633b75a42a3_JaffaCakes118

  • Size

    499KB

  • Sample

    240827-kf6wjssajd

  • MD5

    c4a66759f1e79cd39c53f633b75a42a3

  • SHA1

    e2ecc764ad94a4aebd30c1b1b97365ac84676907

  • SHA256

    1416fcbe8c13e020ed59b1da68f09c8d7f7de47d099ea4d4abd41cfbee05b9b1

  • SHA512

    fa37ed15716f424f19d849c726d8ba3dad5e4c083c5d1ff96e25cbc6de284c2b3d730bff1870e2c8ffadea8539bd116dab93131a14f44a0cb39059fdec59c01b

  • SSDEEP

    12288:KZv1f3cDuHITp6lGNGtsNTe8FqQ8j17H2dp:KrfMfTDzNTf4Q7

Malware Config

Extracted

Family

lokibot

C2

http://higomanga.info/sky9/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c4a66759f1e79cd39c53f633b75a42a3_JaffaCakes118

    • Size

      499KB

    • MD5

      c4a66759f1e79cd39c53f633b75a42a3

    • SHA1

      e2ecc764ad94a4aebd30c1b1b97365ac84676907

    • SHA256

      1416fcbe8c13e020ed59b1da68f09c8d7f7de47d099ea4d4abd41cfbee05b9b1

    • SHA512

      fa37ed15716f424f19d849c726d8ba3dad5e4c083c5d1ff96e25cbc6de284c2b3d730bff1870e2c8ffadea8539bd116dab93131a14f44a0cb39059fdec59c01b

    • SSDEEP

      12288:KZv1f3cDuHITp6lGNGtsNTe8FqQ8j17H2dp:KrfMfTDzNTf4Q7

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks