General

  • Target

    c4f31ca73b151facdb01a36a6aa5d517_JaffaCakes118

  • Size

    784KB

  • Sample

    240827-n42hhs1cqk

  • MD5

    c4f31ca73b151facdb01a36a6aa5d517

  • SHA1

    fe8ae315d454cab236b88f74953923388d97862c

  • SHA256

    ffe005fbedb256fd73d88068639c1498dff4349755048184d8aa3cb254ea1e0d

  • SHA512

    d959c977760fdbcf6c82bd83120db0252de75be7767068734b9f4be0a1512b4fc7acbf14e4a532d16dc1d0d70e8c72bc013db4a22e4632a6678b3ad54a21df26

  • SSDEEP

    12288:lcgK8bhu71Cs31h2SDiLzNu1CVmp240X+Q+7owAMck8YkM82QJzqfSAxpm:lRBbsRB2zgz0X7dMG5Bc1E

Malware Config

Extracted

Family

lokibot

C2

http://wardia.com.pe/wp-includes/texts/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c4f31ca73b151facdb01a36a6aa5d517_JaffaCakes118

    • Size

      784KB

    • MD5

      c4f31ca73b151facdb01a36a6aa5d517

    • SHA1

      fe8ae315d454cab236b88f74953923388d97862c

    • SHA256

      ffe005fbedb256fd73d88068639c1498dff4349755048184d8aa3cb254ea1e0d

    • SHA512

      d959c977760fdbcf6c82bd83120db0252de75be7767068734b9f4be0a1512b4fc7acbf14e4a532d16dc1d0d70e8c72bc013db4a22e4632a6678b3ad54a21df26

    • SSDEEP

      12288:lcgK8bhu71Cs31h2SDiLzNu1CVmp240X+Q+7owAMck8YkM82QJzqfSAxpm:lRBbsRB2zgz0X7dMG5Bc1E

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks