General

  • Target

    d8e911cad235a83195e1489fbc10f593_JaffaCakes118

  • Size

    994KB

  • Sample

    240910-yafzts1dmq

  • MD5

    d8e911cad235a83195e1489fbc10f593

  • SHA1

    85179db0b3bd06ef2230cc3a2a5c6ffc91a51d27

  • SHA256

    31fb207ed7068800a3533ad9477f9852e69e20a701312a164caedcf26137f258

  • SHA512

    ff1ad29bfa9a185b6354b4e75b15abf223c869e0279aa95b2f959285bd6f44e0cf7808a4e002296d298e7e5395fd97e5c0c32f52f452ace1e5d35a240a8e627d

  • SSDEEP

    12288:utb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaSALf4ATTh4qJg8nbT0q:utb20pkaCqT5TBWgNQ7aSANTTf3mO6A

Malware Config

Extracted

Family

lokibot

C2

http://marketings.duckdns.org:6060/jul/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d8e911cad235a83195e1489fbc10f593_JaffaCakes118

    • Size

      994KB

    • MD5

      d8e911cad235a83195e1489fbc10f593

    • SHA1

      85179db0b3bd06ef2230cc3a2a5c6ffc91a51d27

    • SHA256

      31fb207ed7068800a3533ad9477f9852e69e20a701312a164caedcf26137f258

    • SHA512

      ff1ad29bfa9a185b6354b4e75b15abf223c869e0279aa95b2f959285bd6f44e0cf7808a4e002296d298e7e5395fd97e5c0c32f52f452ace1e5d35a240a8e627d

    • SSDEEP

      12288:utb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaSALf4ATTh4qJg8nbT0q:utb20pkaCqT5TBWgNQ7aSANTTf3mO6A

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks