General

  • Target

    f26f65d4d6765fd83611f142ac46ddae_JaffaCakes118

  • Size

    388KB

  • Sample

    240922-vgmt6szfkj

  • MD5

    f26f65d4d6765fd83611f142ac46ddae

  • SHA1

    082e7b38eab40f8980490a5c3487d01967ff1af5

  • SHA256

    b8bb0d658866bd301894c389ecd8f9c846c94fe12994011215fce42072d537bf

  • SHA512

    02e2d75dccf92e9563cbac72e9072c3e55a3f1b2774411754ea2c1d99db2d5b2ca3e35b81b41038f4b0efe0b97497ed1c55e72a69604b3ce397c88b489fb19ce

  • SSDEEP

    6144:HtLz0blStbZARdAHUq7PNQBxEmXi1mrFIxQhcTbhVGwJnx:H9qlSTARdA00PNqEdMrsQhcT9YA

Malware Config

Extracted

Family

lokibot

C2

http://firscool.us/Work/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f26f65d4d6765fd83611f142ac46ddae_JaffaCakes118

    • Size

      388KB

    • MD5

      f26f65d4d6765fd83611f142ac46ddae

    • SHA1

      082e7b38eab40f8980490a5c3487d01967ff1af5

    • SHA256

      b8bb0d658866bd301894c389ecd8f9c846c94fe12994011215fce42072d537bf

    • SHA512

      02e2d75dccf92e9563cbac72e9072c3e55a3f1b2774411754ea2c1d99db2d5b2ca3e35b81b41038f4b0efe0b97497ed1c55e72a69604b3ce397c88b489fb19ce

    • SSDEEP

      6144:HtLz0blStbZARdAHUq7PNQBxEmXi1mrFIxQhcTbhVGwJnx:H9qlSTARdA00PNqEdMrsQhcT9YA

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks