General

  • Target

    f05124fcdd4dbcdede0e398fcce85ee9_JaffaCakes118

  • Size

    893KB

  • Sample

    240415-e6qpcsef26

  • MD5

    f05124fcdd4dbcdede0e398fcce85ee9

  • SHA1

    5f83804885626447baacb9edc388c114a1d0faf1

  • SHA256

    0e20f3d09159e9617d92f6363e80ef28d929e975deaa2883bd98b5956eb17708

  • SHA512

    1128ff0f96386c911e53114bb66077576cd8fbeabec112eb53954b7cc4b06ed2bc88a6d1529a0ba04233fa9d3458d408e21713eaf774977d7d1856f944fc6a7d

  • SSDEEP

    12288:1fZDmaEJbjJEKdqcMSFWRZ0eeLrfRE9EnprNZMS9dOZ5UP83GUTCDc9F3nC0Py3x:9ZDwqV3RZ0e6YYrNZ+W83G

Malware Config

Extracted

Family

lokibot

C2

http://kossa.xyz/kl/vz/ri.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f05124fcdd4dbcdede0e398fcce85ee9_JaffaCakes118

    • Size

      893KB

    • MD5

      f05124fcdd4dbcdede0e398fcce85ee9

    • SHA1

      5f83804885626447baacb9edc388c114a1d0faf1

    • SHA256

      0e20f3d09159e9617d92f6363e80ef28d929e975deaa2883bd98b5956eb17708

    • SHA512

      1128ff0f96386c911e53114bb66077576cd8fbeabec112eb53954b7cc4b06ed2bc88a6d1529a0ba04233fa9d3458d408e21713eaf774977d7d1856f944fc6a7d

    • SSDEEP

      12288:1fZDmaEJbjJEKdqcMSFWRZ0eeLrfRE9EnprNZMS9dOZ5UP83GUTCDc9F3nC0Py3x:9ZDwqV3RZ0e6YYrNZ+W83G

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks