General

  • Target

    dcc60ba2fd1a63fd23c1b46d0dc4e808_JaffaCakes118

  • Size

    897KB

  • Sample

    240912-wq3gnaxaqk

  • MD5

    dcc60ba2fd1a63fd23c1b46d0dc4e808

  • SHA1

    beabdbf1ce4ffe1f2c2957724ab8a6579b7cb34c

  • SHA256

    d71df02bd84ee3f257322538a5bd3f664326f95af49322dca72bd1d0c3a59df6

  • SHA512

    97e8efff1329cbd48e7bb1d23a0dea7499c55989bab7033e341e0fc392d644faa559e3279fad2c9fa2b5909bbb0c123bdb3bb66e8cf544db5970f87584eeaa3a

  • SSDEEP

    768:1EZpjWcWao027WKA8P0p0GNFtlni5d3SZtP9fFncXgLqzFYp3Kr20lRD6cvjOJ3j:+WPMkFmJXkicNQJ+IW4/irtVLe+PDvFy

Malware Config

Extracted

Family

lokibot

C2

http://becharnise.ir/fa15/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      dcc60ba2fd1a63fd23c1b46d0dc4e808_JaffaCakes118

    • Size

      897KB

    • MD5

      dcc60ba2fd1a63fd23c1b46d0dc4e808

    • SHA1

      beabdbf1ce4ffe1f2c2957724ab8a6579b7cb34c

    • SHA256

      d71df02bd84ee3f257322538a5bd3f664326f95af49322dca72bd1d0c3a59df6

    • SHA512

      97e8efff1329cbd48e7bb1d23a0dea7499c55989bab7033e341e0fc392d644faa559e3279fad2c9fa2b5909bbb0c123bdb3bb66e8cf544db5970f87584eeaa3a

    • SSDEEP

      768:1EZpjWcWao027WKA8P0p0GNFtlni5d3SZtP9fFncXgLqzFYp3Kr20lRD6cvjOJ3j:+WPMkFmJXkicNQJ+IW4/irtVLe+PDvFy

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks