General

  • Target

    e7f90c7b3110aef509914ae7b91ca47c_JaffaCakes118

  • Size

    218KB

  • Sample

    240918-amnnfaseka

  • MD5

    e7f90c7b3110aef509914ae7b91ca47c

  • SHA1

    b6b0390cd68775c2ae78ed55754c78f2baa0e114

  • SHA256

    5d36df505d7b0a1c901f66ca396b1ec835ad83065122579793d15a186c93f691

  • SHA512

    bac7c926ab233c2fe502729e49265ca230966c9c35ae3039e8626155261049aff55d34ed6d17e3a1be896a7ab38368f8b523477cefa8e096cca9c5a0c6c43cd6

  • SSDEEP

    6144:fn7Aqob4ATxUWb4XiIKqND4VTgTBH1lK4s:fn8z4Ath4XXLND4VMBC4

Malware Config

Extracted

Family

lokibot

C2

http://beheshtsoft.com/support/bn/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e7f90c7b3110aef509914ae7b91ca47c_JaffaCakes118

    • Size

      218KB

    • MD5

      e7f90c7b3110aef509914ae7b91ca47c

    • SHA1

      b6b0390cd68775c2ae78ed55754c78f2baa0e114

    • SHA256

      5d36df505d7b0a1c901f66ca396b1ec835ad83065122579793d15a186c93f691

    • SHA512

      bac7c926ab233c2fe502729e49265ca230966c9c35ae3039e8626155261049aff55d34ed6d17e3a1be896a7ab38368f8b523477cefa8e096cca9c5a0c6c43cd6

    • SSDEEP

      6144:fn7Aqob4ATxUWb4XiIKqND4VTgTBH1lK4s:fn8z4Ath4XXLND4VMBC4

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks