General

  • Target

    c86fb2f514656d669912d6c131e26950_JaffaCakes118

  • Size

    749KB

  • Sample

    240829-jccb4asbjp

  • MD5

    c86fb2f514656d669912d6c131e26950

  • SHA1

    c1746fedcf8ff893132a863b38fe4c2f5cecce4e

  • SHA256

    68830a24fb818aea27e54e97f4dec890d751166eecb7c02ea3cb03c823e5fe65

  • SHA512

    0ad068cfe205bdcf57c68cd377a19b33f9329100b51b812e573d727e438381f1960b601c2e4c599252285ae41d0506e1cb9f8921d87196235b5c19482c57e569

  • SSDEEP

    12288:KyBCN4jP6eP9teG8WbESKnQTrEtm5ii+CvuM4Z4wNC/:KyBCGjP6+tekRqQTrEHi+xScq

Malware Config

Extracted

Family

lokibot

C2

http://hfktichen.com/kaka/kaka4/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c86fb2f514656d669912d6c131e26950_JaffaCakes118

    • Size

      749KB

    • MD5

      c86fb2f514656d669912d6c131e26950

    • SHA1

      c1746fedcf8ff893132a863b38fe4c2f5cecce4e

    • SHA256

      68830a24fb818aea27e54e97f4dec890d751166eecb7c02ea3cb03c823e5fe65

    • SHA512

      0ad068cfe205bdcf57c68cd377a19b33f9329100b51b812e573d727e438381f1960b601c2e4c599252285ae41d0506e1cb9f8921d87196235b5c19482c57e569

    • SSDEEP

      12288:KyBCN4jP6eP9teG8WbESKnQTrEtm5ii+CvuM4Z4wNC/:KyBCGjP6+tekRqQTrEHi+xScq

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks