General

  • Target

    2a69214ae7798e8f9310baa9bc7151de_JaffaCakes118

  • Size

    708KB

  • Sample

    240509-rwdy2ahd74

  • MD5

    2a69214ae7798e8f9310baa9bc7151de

  • SHA1

    aea38e9078196a1e86b6548020f64b8d28dde39c

  • SHA256

    a9f2fb45fb2fff187fbd6ee2a93c5d9c8c7ef59b1174d0e3e77f4abb62a388a1

  • SHA512

    0fcda1444979d1f526e664d8f03aac245c028cdda9a68870310ecfb0f9cecba42f5e814be9f348fee0e96fd2e5f15e033598af1e2fb4957dec187bfb432e7a7d

  • SSDEEP

    12288:AAJQQbL8HkZqmbdK7u3PsEYdjmloClOxkK82pu:AAGEykZqm4APfYdeoUDKw

Malware Config

Extracted

Family

lokibot

C2

http://uzoma.ru/db/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2a69214ae7798e8f9310baa9bc7151de_JaffaCakes118

    • Size

      708KB

    • MD5

      2a69214ae7798e8f9310baa9bc7151de

    • SHA1

      aea38e9078196a1e86b6548020f64b8d28dde39c

    • SHA256

      a9f2fb45fb2fff187fbd6ee2a93c5d9c8c7ef59b1174d0e3e77f4abb62a388a1

    • SHA512

      0fcda1444979d1f526e664d8f03aac245c028cdda9a68870310ecfb0f9cecba42f5e814be9f348fee0e96fd2e5f15e033598af1e2fb4957dec187bfb432e7a7d

    • SSDEEP

      12288:AAJQQbL8HkZqmbdK7u3PsEYdjmloClOxkK82pu:AAGEykZqm4APfYdeoUDKw

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks