General

  • Target

    e4f54ba74923ff41d918ae105b31f510_JaffaCakes118

  • Size

    917KB

  • Sample

    240916-rp4wwasbrf

  • MD5

    e4f54ba74923ff41d918ae105b31f510

  • SHA1

    41a457edb3669b7949ad232c104d3e505977a37f

  • SHA256

    d8560620db27262f8af525a87487f355a7dd8569ceea2a5ebb0edbee8d7fec2d

  • SHA512

    c598eaf544515a7606c3bb1554c306308009dd88ec207efce83163b12bf432ac0204aed34bed9f0cae2e1ccf252438fca920e843bda8b584751bf7acdc5692f5

  • SSDEEP

    12288:vYV6MorX7qzuC3QHO9FQVHPF51jgc7mJnLM6VjNGQ41TyMIVqTzU8:8BXu9HGaVH7MnLdpNkOnVqn/

Malware Config

Extracted

Family

lokibot

C2

http://rowanyne.co/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e4f54ba74923ff41d918ae105b31f510_JaffaCakes118

    • Size

      917KB

    • MD5

      e4f54ba74923ff41d918ae105b31f510

    • SHA1

      41a457edb3669b7949ad232c104d3e505977a37f

    • SHA256

      d8560620db27262f8af525a87487f355a7dd8569ceea2a5ebb0edbee8d7fec2d

    • SHA512

      c598eaf544515a7606c3bb1554c306308009dd88ec207efce83163b12bf432ac0204aed34bed9f0cae2e1ccf252438fca920e843bda8b584751bf7acdc5692f5

    • SSDEEP

      12288:vYV6MorX7qzuC3QHO9FQVHPF51jgc7mJnLM6VjNGQ41TyMIVqTzU8:8BXu9HGaVH7MnLdpNkOnVqn/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks