General

  • Target

    d6d930833f8f2ede9362a09329e7f4ac_JaffaCakes118

  • Size

    465KB

  • Sample

    240909-wsgmzasbkl

  • MD5

    d6d930833f8f2ede9362a09329e7f4ac

  • SHA1

    38984a2cd22557db3ee44b29a9d7100fffa5ce39

  • SHA256

    7159c94e767e0c5e2bdbcd02f04bffd4226f174dc46755995cd7679c289f6cae

  • SHA512

    632d51bb1112e7518a186321535908a7da6cd42540dbf2fd10c73f32b6e2a75a26dd68b6829d27608758ee63d3b788bc4ae8128842ae59cb1b6ab47eb8a93e7a

  • SSDEEP

    12288:zZUvcU//JjlmM6WSFXJlirXraVnOkul3MvXq1BR:z5aJ8M6TLSXu0kuZMvXQR

Malware Config

Extracted

Family

lokibot

C2

http://webxpo.ga/luky/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d6d930833f8f2ede9362a09329e7f4ac_JaffaCakes118

    • Size

      465KB

    • MD5

      d6d930833f8f2ede9362a09329e7f4ac

    • SHA1

      38984a2cd22557db3ee44b29a9d7100fffa5ce39

    • SHA256

      7159c94e767e0c5e2bdbcd02f04bffd4226f174dc46755995cd7679c289f6cae

    • SHA512

      632d51bb1112e7518a186321535908a7da6cd42540dbf2fd10c73f32b6e2a75a26dd68b6829d27608758ee63d3b788bc4ae8128842ae59cb1b6ab47eb8a93e7a

    • SSDEEP

      12288:zZUvcU//JjlmM6WSFXJlirXraVnOkul3MvXq1BR:z5aJ8M6TLSXu0kuZMvXQR

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks