General

  • Target

    d5e2fe3449a3fec290b00c058377cc9f_JaffaCakes118

  • Size

    648KB

  • Sample

    240909-jhbyhszflf

  • MD5

    d5e2fe3449a3fec290b00c058377cc9f

  • SHA1

    4cf1fdedfff8047be5ed938bd8021dcf99605446

  • SHA256

    4897b86880d58b7cad32d47c65058d6fb704ca6e742f7a6fb9bcd403bb392a56

  • SHA512

    83aec5904cc624707bda4799aedb6645b2d5892ddb72789c6b60fa679fd08555ee1a01aa500de6a526326e0287428e4fd7a9e472647efbcbb9888a49eea5fd71

  • SSDEEP

    1536:vzvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqzIzmdq:USHIG6mQwGmfOQd8YhY0/EGUGq

Malware Config

Extracted

Family

lokibot

C2

http://bergengenharia.com/pat/anel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d5e2fe3449a3fec290b00c058377cc9f_JaffaCakes118

    • Size

      648KB

    • MD5

      d5e2fe3449a3fec290b00c058377cc9f

    • SHA1

      4cf1fdedfff8047be5ed938bd8021dcf99605446

    • SHA256

      4897b86880d58b7cad32d47c65058d6fb704ca6e742f7a6fb9bcd403bb392a56

    • SHA512

      83aec5904cc624707bda4799aedb6645b2d5892ddb72789c6b60fa679fd08555ee1a01aa500de6a526326e0287428e4fd7a9e472647efbcbb9888a49eea5fd71

    • SSDEEP

      1536:vzvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqzIzmdq:USHIG6mQwGmfOQd8YhY0/EGUGq

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks