General

  • Target

    e0a7b9999f07d23a2872f0ebf00d212b_JaffaCakes118

  • Size

    497KB

  • Sample

    240914-vvmrbsvhjm

  • MD5

    e0a7b9999f07d23a2872f0ebf00d212b

  • SHA1

    0a86eacda91ef4fd2e94aa4880a8dda4d324b505

  • SHA256

    f7eef587cceaac7c8fc1012686c9f95ae6dd03274dcb66552e6468a8c0f74b86

  • SHA512

    36ff6bcf1665972f039c6ded5b60f20f627e3ec4205850b0c31fa97a1bfe10bf0f3993c3279c26f1fc7d20a36119ba139bfeb506c9b297f54c07d21d4ba3766f

  • SSDEEP

    6144:UW3xwfWAU5Tsw5ZO20TAO+RwQQPi6sO+MM:dWP5wC27uj

Malware Config

Extracted

Family

lokibot

C2

http://automatia.in/mine/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e0a7b9999f07d23a2872f0ebf00d212b_JaffaCakes118

    • Size

      497KB

    • MD5

      e0a7b9999f07d23a2872f0ebf00d212b

    • SHA1

      0a86eacda91ef4fd2e94aa4880a8dda4d324b505

    • SHA256

      f7eef587cceaac7c8fc1012686c9f95ae6dd03274dcb66552e6468a8c0f74b86

    • SHA512

      36ff6bcf1665972f039c6ded5b60f20f627e3ec4205850b0c31fa97a1bfe10bf0f3993c3279c26f1fc7d20a36119ba139bfeb506c9b297f54c07d21d4ba3766f

    • SSDEEP

      6144:UW3xwfWAU5Tsw5ZO20TAO+RwQQPi6sO+MM:dWP5wC27uj

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks