General

  • Target

    d37cfde68e2ce380945d8ccca14830ee_JaffaCakes118

  • Size

    289KB

  • Sample

    240908-ekr1asvekn

  • MD5

    d37cfde68e2ce380945d8ccca14830ee

  • SHA1

    97d0eb3992c0fc7625cc0e39f6ebb0f9a4190f7c

  • SHA256

    49dda3aeda29f5d2cdbc07ea8e368920578a2bd3dc2456b5d6ad1cda6af22c2f

  • SHA512

    9a1677cecfeb09bf7beb5a05e2f7b1730cbd90cdf2cbc488401c0f49a37f390ec540a75836f4caa072c88a5d8144f90096e23f79aba611be0ddee3940a37405a

  • SSDEEP

    6144:FvStZia36FAnwDjpQrRIj9WEB9/Rwg3fZq:EtZnhQERIj9WEB9/Rw8fZq

Malware Config

Extracted

Family

lokibot

C2

http://blowingminds.ml/panel/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d37cfde68e2ce380945d8ccca14830ee_JaffaCakes118

    • Size

      289KB

    • MD5

      d37cfde68e2ce380945d8ccca14830ee

    • SHA1

      97d0eb3992c0fc7625cc0e39f6ebb0f9a4190f7c

    • SHA256

      49dda3aeda29f5d2cdbc07ea8e368920578a2bd3dc2456b5d6ad1cda6af22c2f

    • SHA512

      9a1677cecfeb09bf7beb5a05e2f7b1730cbd90cdf2cbc488401c0f49a37f390ec540a75836f4caa072c88a5d8144f90096e23f79aba611be0ddee3940a37405a

    • SSDEEP

      6144:FvStZia36FAnwDjpQrRIj9WEB9/Rwg3fZq:EtZnhQERIj9WEB9/Rw8fZq

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks