General

  • Target

    63ac89375763371b022cded1d362ee30_JaffaCakes118

  • Size

    297KB

  • Sample

    240521-r6jx2ahf7z

  • MD5

    63ac89375763371b022cded1d362ee30

  • SHA1

    acf982507203ed72d1c87cf9bea55bc397c7e0f4

  • SHA256

    bfd7dca26413c18a37c6b072cd956aa998324d1fcd4d017857b853ff4557570e

  • SHA512

    d9a129e662dda82e249c80cef4ceda76a2c5f757b354ef242e5a3cefac838e447481b9b3ab0be101249b52622ea78c07d3b849a2b7098649d75fb1876d787f74

  • SSDEEP

    6144:SDK9gnNCOS0xaWZOI4903q+t1FybG70aZTuW371c0f:CdnNCOS0xZAP03qWFyi4aZSEBcK

Malware Config

Extracted

Family

lokibot

C2

http://195.69.140.147/.op/cr.php/SczbkxCQZQyVr

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      yourcrypted_pdf.exe

    • Size

      575KB

    • MD5

      6a357d4bbd7937a1b8d0dc8f04af2d7a

    • SHA1

      da9445adf861caf2b98ad7fb2f22ed2922b9fcf9

    • SHA256

      c351b2e2b11fb6f10ed7cc247a96ab7be144fbfe1687a04bbacf47e212342dba

    • SHA512

      b8aba27d1f8016a30f1816c90d1e70f4e9a1dae07f07411880fa3d9b1e73c31b0f5d4c6732916f787fdd5e01034c6de1f32cef7e1b2a2da7ae5f51c931dd2bd5

    • SSDEEP

      12288:dPOuvPFClYKfrf9fN30Wvza5T1RVlup9yR5t:dGIPQYKT9lcxH7Jt

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks