General

  • Target

    32c70338d2194618c7348fe264bc3b48_JaffaCakes118

  • Size

    926KB

  • Sample

    240511-fb8gcsdh7s

  • MD5

    32c70338d2194618c7348fe264bc3b48

  • SHA1

    64911c3aae58c9c00576e674fcb831afe882dad6

  • SHA256

    2b8895004f21ae10dd35787385807ea83303eb8730f4a6375f159a7788bef7bc

  • SHA512

    856aac093936a52195df6eda3f65de3b58052ac36edf5fd22ec0d8d65c740272055f8ff99e552730cbf12814267ed563737b9ec1fe9291f2944fbe302605268c

  • SSDEEP

    12288:Etb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaZVJ3TlNeeJJ6A:Etb20pkaCqT5TBWgNQ7aZVtzeeJJ6A

Malware Config

Extracted

Family

lokibot

C2

http://157.52.211.11/recovery/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      32c70338d2194618c7348fe264bc3b48_JaffaCakes118

    • Size

      926KB

    • MD5

      32c70338d2194618c7348fe264bc3b48

    • SHA1

      64911c3aae58c9c00576e674fcb831afe882dad6

    • SHA256

      2b8895004f21ae10dd35787385807ea83303eb8730f4a6375f159a7788bef7bc

    • SHA512

      856aac093936a52195df6eda3f65de3b58052ac36edf5fd22ec0d8d65c740272055f8ff99e552730cbf12814267ed563737b9ec1fe9291f2944fbe302605268c

    • SSDEEP

      12288:Etb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaZVJ3TlNeeJJ6A:Etb20pkaCqT5TBWgNQ7aZVtzeeJJ6A

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks