General

  • Target

    f4555fabbebf7bf33f7be8d90a9fdf38_JaffaCakes118

  • Size

    590KB

  • Sample

    240416-z1wcwaec5y

  • MD5

    f4555fabbebf7bf33f7be8d90a9fdf38

  • SHA1

    5faefd107a77ed4bd6a1f4352936a28cf96c5d42

  • SHA256

    c1d9b04bca7264c76a2eae6357f6a2fc931237f374db992a926db9dd714b85c5

  • SHA512

    b7413d59e3fc8c40c967a82af72d6c8b7df792f5a796d055f542f0fdacffb708028336b5469447d57f575f5831db38cee69a6c1c8d3e441d9e9169e248fb766b

  • SSDEEP

    6144:mO0Zra6Mlohvg6W6Uq1l9W+OJz921AsOjzbsFda9DWDO/Qmbz1Lsp7FU3Ds6e7x5:CdhvNUi0Ee9/Qmc6e1he1

Malware Config

Extracted

Family

lokibot

C2

http://checkvim.com/fd3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f4555fabbebf7bf33f7be8d90a9fdf38_JaffaCakes118

    • Size

      590KB

    • MD5

      f4555fabbebf7bf33f7be8d90a9fdf38

    • SHA1

      5faefd107a77ed4bd6a1f4352936a28cf96c5d42

    • SHA256

      c1d9b04bca7264c76a2eae6357f6a2fc931237f374db992a926db9dd714b85c5

    • SHA512

      b7413d59e3fc8c40c967a82af72d6c8b7df792f5a796d055f542f0fdacffb708028336b5469447d57f575f5831db38cee69a6c1c8d3e441d9e9169e248fb766b

    • SSDEEP

      6144:mO0Zra6Mlohvg6W6Uq1l9W+OJz921AsOjzbsFda9DWDO/Qmbz1Lsp7FU3Ds6e7x5:CdhvNUi0Ee9/Qmc6e1he1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks