General

  • Target

    d3222e254e6334f50f5abc766bb12514_JaffaCakes118

  • Size

    489KB

  • Sample

    240908-amy46stcpq

  • MD5

    d3222e254e6334f50f5abc766bb12514

  • SHA1

    0bdcd605c4b77eeee912f9ea1d3c025437ba73a1

  • SHA256

    354e0aadf9872237b4ab76f7f3706a0515dfa38a5c8d65a90193144613ea7901

  • SHA512

    e1062b97dd6a52eb1297bb6d6ddd2869f6c83f9abe8c38bf893a8569ae9e9b65967ad2e038ec9df6755154b8b42ce709ff7ed2e11153694238e495115eed6e23

  • SSDEEP

    12288:Kcgo5W5zIFp3ZDCB4q+k9uodiunyJT6YashlM0JT6YashlM:bgwfnzq+Sur9ashlV9ashl

Malware Config

Extracted

Family

lokibot

C2

http://136.243.159.53/~element/page.php?id=484

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d3222e254e6334f50f5abc766bb12514_JaffaCakes118

    • Size

      489KB

    • MD5

      d3222e254e6334f50f5abc766bb12514

    • SHA1

      0bdcd605c4b77eeee912f9ea1d3c025437ba73a1

    • SHA256

      354e0aadf9872237b4ab76f7f3706a0515dfa38a5c8d65a90193144613ea7901

    • SHA512

      e1062b97dd6a52eb1297bb6d6ddd2869f6c83f9abe8c38bf893a8569ae9e9b65967ad2e038ec9df6755154b8b42ce709ff7ed2e11153694238e495115eed6e23

    • SSDEEP

      12288:Kcgo5W5zIFp3ZDCB4q+k9uodiunyJT6YashlM0JT6YashlM:bgwfnzq+Sur9ashlV9ashl

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks