General

  • Target

    e50abf7b3bcde25b111b1ceb086deff9_JaffaCakes118

  • Size

    591KB

  • Sample

    240916-sm9vsavcmp

  • MD5

    e50abf7b3bcde25b111b1ceb086deff9

  • SHA1

    60419b5b85ee6358edad3dfb283ce7ca91e619ba

  • SHA256

    818e88bb143f792650951cedb91b2023a32b78d497ccd6314bf9c0c4f57a45bb

  • SHA512

    025782d1e6fc3c75f07a35411d291defe3e76675424ec8cd77c8d82ecce6c4abbbb234253a44b11669abf52120e99f738bc889d3e8d4286cd7855e558077c203

  • SSDEEP

    12288:EYk/Dt4cTl5xJzV8ywfE0cyDU4G9aLPESTLIyAXWor8EsHJvNfHB:i53rRZQo4TpLIlzspZHB

Malware Config

Extracted

Family

lokibot

C2

http://pmw-ch.com/duck/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e50abf7b3bcde25b111b1ceb086deff9_JaffaCakes118

    • Size

      591KB

    • MD5

      e50abf7b3bcde25b111b1ceb086deff9

    • SHA1

      60419b5b85ee6358edad3dfb283ce7ca91e619ba

    • SHA256

      818e88bb143f792650951cedb91b2023a32b78d497ccd6314bf9c0c4f57a45bb

    • SHA512

      025782d1e6fc3c75f07a35411d291defe3e76675424ec8cd77c8d82ecce6c4abbbb234253a44b11669abf52120e99f738bc889d3e8d4286cd7855e558077c203

    • SSDEEP

      12288:EYk/Dt4cTl5xJzV8ywfE0cyDU4G9aLPESTLIyAXWor8EsHJvNfHB:i53rRZQo4TpLIlzspZHB

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks