General

  • Target

    fcee486c8496785dc3e467d53b14f8fa_JaffaCakes118

  • Size

    212KB

  • Sample

    240928-xhp22atele

  • MD5

    fcee486c8496785dc3e467d53b14f8fa

  • SHA1

    a5b2f00fec3c3cd47ad69e28965286e387b9f1d2

  • SHA256

    047254190855a5ff47d744bf80d8227391ce8893396958039dbf6f2e31deac09

  • SHA512

    cc9546ec264095c792bca02f08a132d2561d34f20ba1edab624802feed204dbe8b1ac333d829b7dbb31471fa433b90f45505c66b0c2494423a0984de197058dc

  • SSDEEP

    3072:fSHIG6mQwGmfOQd8YhY0/EqUGDHaa/Gup5SJBgZ4G3/HR3TxI9og++1hSGeCL6G1:fcd6bUfFdXThU2HaaOuCJCDaN1lbn

Malware Config

Extracted

Family

lokibot

C2

http://tcoolonline.mobi/wp-admin/css/colors/blue/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fcee486c8496785dc3e467d53b14f8fa_JaffaCakes118

    • Size

      212KB

    • MD5

      fcee486c8496785dc3e467d53b14f8fa

    • SHA1

      a5b2f00fec3c3cd47ad69e28965286e387b9f1d2

    • SHA256

      047254190855a5ff47d744bf80d8227391ce8893396958039dbf6f2e31deac09

    • SHA512

      cc9546ec264095c792bca02f08a132d2561d34f20ba1edab624802feed204dbe8b1ac333d829b7dbb31471fa433b90f45505c66b0c2494423a0984de197058dc

    • SSDEEP

      3072:fSHIG6mQwGmfOQd8YhY0/EqUGDHaa/Gup5SJBgZ4G3/HR3TxI9og++1hSGeCL6G1:fcd6bUfFdXThU2HaaOuCJCDaN1lbn

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks