General

  • Target

    d3addeeb728e0d35f8ec1a098f33ce9b_JaffaCakes118

  • Size

    523KB

  • Sample

    240908-gf2p2ssbld

  • MD5

    d3addeeb728e0d35f8ec1a098f33ce9b

  • SHA1

    2a4aa052b8525bf5f9f05cc965ba138f3af8673b

  • SHA256

    35aa9e89dc0cea97ecfba933daf338567a7c00a50cfe18cfd4a85c2870164351

  • SHA512

    567c95a43bf3029262b66187d760008c6d9d8fbb54814e5f0c1880a6330e68230221e296d2ea2381ede915bad9ea0fd329e90923e0ebe08642996b3d5bdac38b

  • SSDEEP

    6144:uCdK6Srtxx81k3hFB1sx+nQN0wYMEoMeQCjFRHIeNbeCp+jYdUYmt3LQpzd5BuV1:stxx8GVssOEoMaFRHIeN6YeF70MVeA

Malware Config

Extracted

Family

lokibot

C2

http://178.156.202.117/lewy/lewy/sun/quakes/solar/gem/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d3addeeb728e0d35f8ec1a098f33ce9b_JaffaCakes118

    • Size

      523KB

    • MD5

      d3addeeb728e0d35f8ec1a098f33ce9b

    • SHA1

      2a4aa052b8525bf5f9f05cc965ba138f3af8673b

    • SHA256

      35aa9e89dc0cea97ecfba933daf338567a7c00a50cfe18cfd4a85c2870164351

    • SHA512

      567c95a43bf3029262b66187d760008c6d9d8fbb54814e5f0c1880a6330e68230221e296d2ea2381ede915bad9ea0fd329e90923e0ebe08642996b3d5bdac38b

    • SSDEEP

      6144:uCdK6Srtxx81k3hFB1sx+nQN0wYMEoMeQCjFRHIeNbeCp+jYdUYmt3LQpzd5BuV1:stxx8GVssOEoMaFRHIeN6YeF70MVeA

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks