General

  • Target

    3744a772d7bfc5fa3e1a789e87552c59_JaffaCakes118

  • Size

    318KB

  • Sample

    240512-al9jhsfe3w

  • MD5

    3744a772d7bfc5fa3e1a789e87552c59

  • SHA1

    05ca15cf81a9ae5700647519669ee82afdd0d1bb

  • SHA256

    c43b0c99da438892e85837872b4588b7ac6aeaaca2e1169c7136a439033ab762

  • SHA512

    fe6b32680d3fb47a613ae8a26e9180597b6db9ae82de4d8d7cc7f8c2d355230920feb48071f0fbea539f4518fda6a93e10851178cca72889e389d821fd00d76c

  • SSDEEP

    6144:3Pi2GhNh3AVk4zUYhssq9ntlwzqUp5gij+Usp2V3Z2z:3Pi2iN12k4zUYh1qxtlwGUS3p2VQz

Malware Config

Extracted

Family

lokibot

C2

http://admaris.ir/kenlaw/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      3744a772d7bfc5fa3e1a789e87552c59_JaffaCakes118

    • Size

      318KB

    • MD5

      3744a772d7bfc5fa3e1a789e87552c59

    • SHA1

      05ca15cf81a9ae5700647519669ee82afdd0d1bb

    • SHA256

      c43b0c99da438892e85837872b4588b7ac6aeaaca2e1169c7136a439033ab762

    • SHA512

      fe6b32680d3fb47a613ae8a26e9180597b6db9ae82de4d8d7cc7f8c2d355230920feb48071f0fbea539f4518fda6a93e10851178cca72889e389d821fd00d76c

    • SSDEEP

      6144:3Pi2GhNh3AVk4zUYhssq9ntlwzqUp5gij+Usp2V3Z2z:3Pi2iN12k4zUYh1qxtlwGUS3p2VQz

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks