General

  • Target

    f0788b74439d4494761c8aa1c6bdd657_JaffaCakes118

  • Size

    299KB

  • Sample

    240415-gnekgsag2z

  • MD5

    f0788b74439d4494761c8aa1c6bdd657

  • SHA1

    98f426a0e99edbf29f41dfcb273444f4eeb4116d

  • SHA256

    5c6bdf4277321ebade7a21872615ff93e64395c99e59c725c238881f04e56e3c

  • SHA512

    f2e588aeb45d81cd2a0bc992d07dc4e3820276819edaaf591ea55a01f55e3a46024f69d7becba9560539001e283b99ff534df13977c60a7c68374056f7efea13

  • SSDEEP

    6144:pjP5IphwxkeVG6fNROQh/cqtYoMqs+hYZIHN/8LKk:RP57w6ypDoBs+hY0CR

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.18/dsaicosaicasdi.php/4jmQmvXLmQyTH

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f0788b74439d4494761c8aa1c6bdd657_JaffaCakes118

    • Size

      299KB

    • MD5

      f0788b74439d4494761c8aa1c6bdd657

    • SHA1

      98f426a0e99edbf29f41dfcb273444f4eeb4116d

    • SHA256

      5c6bdf4277321ebade7a21872615ff93e64395c99e59c725c238881f04e56e3c

    • SHA512

      f2e588aeb45d81cd2a0bc992d07dc4e3820276819edaaf591ea55a01f55e3a46024f69d7becba9560539001e283b99ff534df13977c60a7c68374056f7efea13

    • SSDEEP

      6144:pjP5IphwxkeVG6fNROQh/cqtYoMqs+hYZIHN/8LKk:RP57w6ypDoBs+hY0CR

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks