General

  • Target

    c6ee9fc0d11ede8373b7313db998bba0_JaffaCakes118

  • Size

    506KB

  • Sample

    240828-qmmdda1frk

  • MD5

    c6ee9fc0d11ede8373b7313db998bba0

  • SHA1

    ecc160e61ce237eaafd81d0c41685bba0b09be30

  • SHA256

    7cf4902a674dd38dd699992bd6664ebe5130fe93daffd14965bbcf6afea47569

  • SHA512

    c80cfaf548b4ccf0020c431ad2bbd3599d25aba92dec4903d83943c10625bca6028d6d50571d212889614a829b657fd21c92fa83bf34c8ad6c9afbf41bef8a06

  • SSDEEP

    12288:reoSB+d1TZ/ah0nmfJADBji8RZQnJT6YashlM0JT6YashlM:6/419kmzbZQR9ashlV9ashl

Malware Config

Extracted

Family

lokibot

C2

http://checkvim.com/ga11/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c6ee9fc0d11ede8373b7313db998bba0_JaffaCakes118

    • Size

      506KB

    • MD5

      c6ee9fc0d11ede8373b7313db998bba0

    • SHA1

      ecc160e61ce237eaafd81d0c41685bba0b09be30

    • SHA256

      7cf4902a674dd38dd699992bd6664ebe5130fe93daffd14965bbcf6afea47569

    • SHA512

      c80cfaf548b4ccf0020c431ad2bbd3599d25aba92dec4903d83943c10625bca6028d6d50571d212889614a829b657fd21c92fa83bf34c8ad6c9afbf41bef8a06

    • SSDEEP

      12288:reoSB+d1TZ/ah0nmfJADBji8RZQnJT6YashlM0JT6YashlM:6/419kmzbZQR9ashlV9ashl

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks