General

  • Target

    201bf860acfcce5133ed4261884c3201_JaffaCakes118

  • Size

    238KB

  • Sample

    240507-kw42wscb96

  • MD5

    201bf860acfcce5133ed4261884c3201

  • SHA1

    5eb77a4a189755719932da71915932c419eac1cb

  • SHA256

    c9df476a8422d1f4beceefdced0e9323b4abfe7a68edeebd8a62a58356843717

  • SHA512

    4a6d524a7eb7a8c2a10510e1ba078e849dbba50a31324ffd4f45074b68be12c445fce4807e05251e0edc39a7a6fcd3e83d68cce57a9da070d5a5f5c775182a29

  • SSDEEP

    6144:svrAFvyMbT9OxuK6Uw9wio9kCYk5k8/Wc8iSKCF:svUFIgK6r9XCN5kAk

Malware Config

Extracted

Family

lokibot

C2

http://31.220.40.22/~lahtipre/dwise/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      201bf860acfcce5133ed4261884c3201_JaffaCakes118

    • Size

      238KB

    • MD5

      201bf860acfcce5133ed4261884c3201

    • SHA1

      5eb77a4a189755719932da71915932c419eac1cb

    • SHA256

      c9df476a8422d1f4beceefdced0e9323b4abfe7a68edeebd8a62a58356843717

    • SHA512

      4a6d524a7eb7a8c2a10510e1ba078e849dbba50a31324ffd4f45074b68be12c445fce4807e05251e0edc39a7a6fcd3e83d68cce57a9da070d5a5f5c775182a29

    • SSDEEP

      6144:svrAFvyMbT9OxuK6Uw9wio9kCYk5k8/Wc8iSKCF:svUFIgK6r9XCN5kAk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks