General

  • Target

    04da28e1e2f5f59e53be79921720c92f_JaffaCakes118

  • Size

    388KB

  • Sample

    240623-ck3exszapj

  • MD5

    04da28e1e2f5f59e53be79921720c92f

  • SHA1

    864a8cd519fefb536c3dffae37eed196a20b23f4

  • SHA256

    8363765ca1ed896fa3f428812509b36d7f77f97a1746b34e8f9f64e18589d0b0

  • SHA512

    4c1f89b1cc56315964afa3690ee6150e1f8b0939f367de643eec499f5f2aa23f0c6a6e84f29fc12af6d45a1228cbff2fbb0d62a8157109e7d06c7e860ea89d7f

  • SSDEEP

    12288:vFda+Fda7CbYQjoiuN3JI8xd5rtSGFAZnreQQAf:oCbYQjoBN3JI8zlStr

Malware Config

Extracted

Family

lokibot

C2

http://51.195.53.221/p.php/zJx6s66z1V9LA

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      04da28e1e2f5f59e53be79921720c92f_JaffaCakes118

    • Size

      388KB

    • MD5

      04da28e1e2f5f59e53be79921720c92f

    • SHA1

      864a8cd519fefb536c3dffae37eed196a20b23f4

    • SHA256

      8363765ca1ed896fa3f428812509b36d7f77f97a1746b34e8f9f64e18589d0b0

    • SHA512

      4c1f89b1cc56315964afa3690ee6150e1f8b0939f367de643eec499f5f2aa23f0c6a6e84f29fc12af6d45a1228cbff2fbb0d62a8157109e7d06c7e860ea89d7f

    • SSDEEP

      12288:vFda+Fda7CbYQjoiuN3JI8xd5rtSGFAZnreQQAf:oCbYQjoBN3JI8zlStr

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks