General

  • Target

    cff4e6fe76ea3912015698fd122d69cb_JaffaCakes118

  • Size

    784KB

  • Sample

    240906-twamqawdnn

  • MD5

    cff4e6fe76ea3912015698fd122d69cb

  • SHA1

    502b11c01f19687a6dbe953c6ea7c0806aaace2d

  • SHA256

    50a8d30d3a8a6f9997b430fce84d5917b5b9c972807cfeb293bab90097506336

  • SHA512

    668fe75ce676b9086831eaabd8861700617ae08a6bc37dff81fa8e5831196274bf41c0e960cb328244a0612a2222649fbbf2eac6352fa80aa5bffd4ca71b03d7

  • SSDEEP

    12288:CyBjjSQITjRujdY3pw8s6IvG4HL6eP9WtXcNef:9Vj054Y3pdsXv3r6+yXcsf

Malware Config

Extracted

Family

lokibot

C2

http://brokensoul.cf/Bobby/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      cff4e6fe76ea3912015698fd122d69cb_JaffaCakes118

    • Size

      784KB

    • MD5

      cff4e6fe76ea3912015698fd122d69cb

    • SHA1

      502b11c01f19687a6dbe953c6ea7c0806aaace2d

    • SHA256

      50a8d30d3a8a6f9997b430fce84d5917b5b9c972807cfeb293bab90097506336

    • SHA512

      668fe75ce676b9086831eaabd8861700617ae08a6bc37dff81fa8e5831196274bf41c0e960cb328244a0612a2222649fbbf2eac6352fa80aa5bffd4ca71b03d7

    • SSDEEP

      12288:CyBjjSQITjRujdY3pw8s6IvG4HL6eP9WtXcNef:9Vj054Y3pdsXv3r6+yXcsf

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks