General

  • Target

    d3de90b3bd6b8144533566cccd101f7f_JaffaCakes118

  • Size

    316KB

  • Sample

    240908-jj97pstgrk

  • MD5

    d3de90b3bd6b8144533566cccd101f7f

  • SHA1

    ef9c081b1cdd2e8c57987e574d017beb4f9190fa

  • SHA256

    5bc3e71d5dbaf06a107f80d6526727a72e57e3a39b9c390d5368e888b9a4b99f

  • SHA512

    6d1683ec091312b6b900c794e8e51237867ac122ee764b85cecea849ec840026faa4e307b6593669bd3438294d97e9234039fd2180872fe39af508179ba9559d

  • SSDEEP

    6144:IVdHZXPfoY3d0OnWCCVUV+Cag1meR7OlOt4:odHxPQYNPdZ44QeRKlOt

Malware Config

Extracted

Family

lokibot

C2

http://217.182.9.193/~zadmin/nomade/conn.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d3de90b3bd6b8144533566cccd101f7f_JaffaCakes118

    • Size

      316KB

    • MD5

      d3de90b3bd6b8144533566cccd101f7f

    • SHA1

      ef9c081b1cdd2e8c57987e574d017beb4f9190fa

    • SHA256

      5bc3e71d5dbaf06a107f80d6526727a72e57e3a39b9c390d5368e888b9a4b99f

    • SHA512

      6d1683ec091312b6b900c794e8e51237867ac122ee764b85cecea849ec840026faa4e307b6593669bd3438294d97e9234039fd2180872fe39af508179ba9559d

    • SSDEEP

      6144:IVdHZXPfoY3d0OnWCCVUV+Cag1meR7OlOt4:odHxPQYNPdZ44QeRKlOt

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks