General

  • Target

    44c791fb0cb1b512b7d3dcd06d3121f3_JaffaCakes118

  • Size

    171KB

  • Sample

    240515-glcccacc36

  • MD5

    44c791fb0cb1b512b7d3dcd06d3121f3

  • SHA1

    932634f180cf8b50ab5ba4639dacaabcb7a66439

  • SHA256

    1001921312699ebe97cf11774adba8a92b0c8dc29af608b8f5dea1a41c15daf2

  • SHA512

    7fab21babf622c7391a84e57f2584edc5e64f18f385bc219c0396749bcdca7c10409d75c6ca5900f2be2fac19abf7ba9ece1801d96c76bd9faab75609366a006

  • SSDEEP

    3072:1Vng9P4jEfEp72IOzIB2EoAdBXXcEuZtQgXXKloV+Vkl6h1hlliGeIiXv0+L+vqT:Lg9P4jEfEp72IOzIB2EoAdBXsEu7QgXW

Malware Config

Extracted

Family

lokibot

C2

http://lahtiprecission.ir/movic/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      44c791fb0cb1b512b7d3dcd06d3121f3_JaffaCakes118

    • Size

      171KB

    • MD5

      44c791fb0cb1b512b7d3dcd06d3121f3

    • SHA1

      932634f180cf8b50ab5ba4639dacaabcb7a66439

    • SHA256

      1001921312699ebe97cf11774adba8a92b0c8dc29af608b8f5dea1a41c15daf2

    • SHA512

      7fab21babf622c7391a84e57f2584edc5e64f18f385bc219c0396749bcdca7c10409d75c6ca5900f2be2fac19abf7ba9ece1801d96c76bd9faab75609366a006

    • SSDEEP

      3072:1Vng9P4jEfEp72IOzIB2EoAdBXXcEuZtQgXXKloV+Vkl6h1hlliGeIiXv0+L+vqT:Lg9P4jEfEp72IOzIB2EoAdBXsEu7QgXW

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks