General

  • Target

    fa5fe11f37318bf2793b5ffafe621345_JaffaCakes118

  • Size

    621KB

  • Sample

    240419-qjbsgaec8z

  • MD5

    fa5fe11f37318bf2793b5ffafe621345

  • SHA1

    6d2798dc94fadec0e00e5799e0b6b99e53b3e6e7

  • SHA256

    467db49e07d592f97847aeb59d6b8c34df885c77ae573b1d149d0c055d861bbc

  • SHA512

    78eddcc3f300d2448ae33c1e84722e5af9f5a401425853ee25dc16a226511323eaee0c24c402c36ec35d1f33d11960f06ae7af943afeeb97c180339b012f9628

  • SSDEEP

    12288:/xqFwM8l4Ir85r6Wdtgy/wkMjfg4pO18+TyWAnXLwI5K+hp:Qf82N6Yd/SjE13TNq

Malware Config

Extracted

Family

lokibot

C2

http://192.236.162.239/zed/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fa5fe11f37318bf2793b5ffafe621345_JaffaCakes118

    • Size

      621KB

    • MD5

      fa5fe11f37318bf2793b5ffafe621345

    • SHA1

      6d2798dc94fadec0e00e5799e0b6b99e53b3e6e7

    • SHA256

      467db49e07d592f97847aeb59d6b8c34df885c77ae573b1d149d0c055d861bbc

    • SHA512

      78eddcc3f300d2448ae33c1e84722e5af9f5a401425853ee25dc16a226511323eaee0c24c402c36ec35d1f33d11960f06ae7af943afeeb97c180339b012f9628

    • SSDEEP

      12288:/xqFwM8l4Ir85r6Wdtgy/wkMjfg4pO18+TyWAnXLwI5K+hp:Qf82N6Yd/SjE13TNq

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks