General

  • Target

    4ff87ad46311de76229dc57a1c3b72ee_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240517-rp9gcsbe3x

  • MD5

    4ff87ad46311de76229dc57a1c3b72ee

  • SHA1

    51cb03f06b8f5485842a192f137f4b746d87f7e4

  • SHA256

    f614e6f10dcbfd97cf6d33ce9c480a96e38b8bea4245067e7e2ef2d0b0cfcc8d

  • SHA512

    7631ea53673ee9d0475905152e1fa4ec29a36df234e5943f21f55e752098715f3ddfac6c8fb72640df9e34ba7c4699a542a60db59db548f324e67203cac0bb8c

  • SSDEEP

    24576:O4qMHwL06i5ZTx3hucuuCN4HwgqOPqKy7vJydBWNe/ISImkz:NZxucudHgQKKvGBWWk

Malware Config

Extracted

Family

lokibot

C2

http://omantell.net.in/components/com_finder/jizzy/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4ff87ad46311de76229dc57a1c3b72ee_JaffaCakes118

    • Size

      1.1MB

    • MD5

      4ff87ad46311de76229dc57a1c3b72ee

    • SHA1

      51cb03f06b8f5485842a192f137f4b746d87f7e4

    • SHA256

      f614e6f10dcbfd97cf6d33ce9c480a96e38b8bea4245067e7e2ef2d0b0cfcc8d

    • SHA512

      7631ea53673ee9d0475905152e1fa4ec29a36df234e5943f21f55e752098715f3ddfac6c8fb72640df9e34ba7c4699a542a60db59db548f324e67203cac0bb8c

    • SSDEEP

      24576:O4qMHwL06i5ZTx3hucuuCN4HwgqOPqKy7vJydBWNe/ISImkz:NZxucudHgQKKvGBWWk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks