General

  • Target

    e5afe17865a1456be6153f12aebcf32c_JaffaCakes118

  • Size

    451KB

  • Sample

    240916-2hr9lstcjk

  • MD5

    e5afe17865a1456be6153f12aebcf32c

  • SHA1

    aa81925a316435dd4f470ec6185d1e639979bda5

  • SHA256

    e13f2c3739cde78319b881d1b08163d243d041cdc8a8826db84aa597447822fc

  • SHA512

    c8fc8d5cc5d478892abcc10410812d355cd077885b2f010b23f650aa7d0d82295169840d73881b83713ae9fb28baeb6873d8ea8b8bcab130439fb306cb6b5ed0

  • SSDEEP

    3072:kH6hZBJKlxRgt0fjc7uXTDVHnmrArUqSlGB:OOZBJKl7gt0bcKHVHmrAg

Malware Config

Extracted

Family

lokibot

C2

http://e2systems.se/wp-content/test/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e5afe17865a1456be6153f12aebcf32c_JaffaCakes118

    • Size

      451KB

    • MD5

      e5afe17865a1456be6153f12aebcf32c

    • SHA1

      aa81925a316435dd4f470ec6185d1e639979bda5

    • SHA256

      e13f2c3739cde78319b881d1b08163d243d041cdc8a8826db84aa597447822fc

    • SHA512

      c8fc8d5cc5d478892abcc10410812d355cd077885b2f010b23f650aa7d0d82295169840d73881b83713ae9fb28baeb6873d8ea8b8bcab130439fb306cb6b5ed0

    • SSDEEP

      3072:kH6hZBJKlxRgt0fjc7uXTDVHnmrArUqSlGB:OOZBJKl7gt0bcKHVHmrAg

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks