General

  • Target

    dcc84429e3a0d463759001e563b9cbb6_JaffaCakes118

  • Size

    631KB

  • Sample

    240912-wtvwzsxcpb

  • MD5

    dcc84429e3a0d463759001e563b9cbb6

  • SHA1

    009decafbfea7c8cddd3ab8f15cea6d2f7d0778b

  • SHA256

    e52467a52905d1fe75ab7f7a0bab844f25e793344f1153928ed53caa58701bfa

  • SHA512

    343f8d48daba3caa5e016d705d4b5386afc325099ebb1c7d61270ee9cf975018905636011757e3952ad1fbe30b29abfbc40f36c3ea9c157864d89b7f5086c67b

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqtIzmd:nSHIG6mQwGmfOQd8YhY0/EYUG

Malware Config

Extracted

Family

lokibot

C2

http://oppws.cn/blade/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      dcc84429e3a0d463759001e563b9cbb6_JaffaCakes118

    • Size

      631KB

    • MD5

      dcc84429e3a0d463759001e563b9cbb6

    • SHA1

      009decafbfea7c8cddd3ab8f15cea6d2f7d0778b

    • SHA256

      e52467a52905d1fe75ab7f7a0bab844f25e793344f1153928ed53caa58701bfa

    • SHA512

      343f8d48daba3caa5e016d705d4b5386afc325099ebb1c7d61270ee9cf975018905636011757e3952ad1fbe30b29abfbc40f36c3ea9c157864d89b7f5086c67b

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqtIzmd:nSHIG6mQwGmfOQd8YhY0/EYUG

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks