General

  • Target

    c691a91aecdef4e239ec3167010fc0f7_JaffaCakes118

  • Size

    612KB

  • Sample

    240828-k8nwfasfph

  • MD5

    c691a91aecdef4e239ec3167010fc0f7

  • SHA1

    89815e76e04ba6a255ea622db0d8c14504221b7f

  • SHA256

    3489069aff3395387f1ac8c700c12008bc6158aac3dc2109c077350231aaf763

  • SHA512

    d69ba157b54c422688722c6d9f02e54657803fb5034bc557c72d5a6f29a8b077f2b42eadddaa4f2a8f3c23b4673b31ed9b0dea47e753bae5c0549108be5ce7c3

  • SSDEEP

    12288:TE+zLqBmrA2LTz7H5JPiYltjzu8+H214q1m4ElZzAJWQx:TEEmBoZT5JPjt1+khuZzAIQ

Malware Config

Extracted

Family

lokibot

C2

http://31.220.2.200/~justicet/em/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c691a91aecdef4e239ec3167010fc0f7_JaffaCakes118

    • Size

      612KB

    • MD5

      c691a91aecdef4e239ec3167010fc0f7

    • SHA1

      89815e76e04ba6a255ea622db0d8c14504221b7f

    • SHA256

      3489069aff3395387f1ac8c700c12008bc6158aac3dc2109c077350231aaf763

    • SHA512

      d69ba157b54c422688722c6d9f02e54657803fb5034bc557c72d5a6f29a8b077f2b42eadddaa4f2a8f3c23b4673b31ed9b0dea47e753bae5c0549108be5ce7c3

    • SSDEEP

      12288:TE+zLqBmrA2LTz7H5JPiYltjzu8+H214q1m4ElZzAJWQx:TEEmBoZT5JPjt1+khuZzAIQ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks