General

  • Target

    4ebddc153fb991334e48861abb3640dd_JaffaCakes118

  • Size

    521KB

  • Sample

    240517-gxtqrsch61

  • MD5

    4ebddc153fb991334e48861abb3640dd

  • SHA1

    2bccc6760970fd7f38534ad04504412ef20ede9e

  • SHA256

    0e63ee22a2a9b5b15e0227772a72bbbb48bc5987833615ff42a6e6447221ea80

  • SHA512

    432d62d3601f34902119b6373810429900947bdab069412a0c8d02e9dd9b372adf290371197328d0df66a1d88f535ddd300696674c3404227d63cc0b5387043c

  • SSDEEP

    12288:SCVIDRqnBI3euYAdlRl0QwKpZNBUy6kvsKq:RVIAy3ed9K1yy5q

Malware Config

Extracted

Family

lokibot

C2

http://nwatti.tk/gata/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4ebddc153fb991334e48861abb3640dd_JaffaCakes118

    • Size

      521KB

    • MD5

      4ebddc153fb991334e48861abb3640dd

    • SHA1

      2bccc6760970fd7f38534ad04504412ef20ede9e

    • SHA256

      0e63ee22a2a9b5b15e0227772a72bbbb48bc5987833615ff42a6e6447221ea80

    • SHA512

      432d62d3601f34902119b6373810429900947bdab069412a0c8d02e9dd9b372adf290371197328d0df66a1d88f535ddd300696674c3404227d63cc0b5387043c

    • SSDEEP

      12288:SCVIDRqnBI3euYAdlRl0QwKpZNBUy6kvsKq:RVIAy3ed9K1yy5q

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks