General

  • Target

    6fa59c037085c8f1d744da3f0bcf4404_JaffaCakes118

  • Size

    802KB

  • Sample

    240524-yjvvcagh8z

  • MD5

    6fa59c037085c8f1d744da3f0bcf4404

  • SHA1

    99540076afe5478f0268f5cc35449b510b883fc2

  • SHA256

    adcf0b372228b76e987deecd0f45733e93dee3a798258546612a8f2232044d81

  • SHA512

    23f8d74f6483886f71a939f7ea36dcc476a95115e6d05db0e1fa657495dadd8864f7ff2a3849f8fa3849decd5d8e53e0fce8f0184a1f30bd9f914c1dce9b9f0d

  • SSDEEP

    12288:Cb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hO+mVvldcgcbqSw:7eSHhYRRxOVGcxJBdb1LwvOc

Malware Config

Extracted

Family

lokibot

C2

http://tkanilux.com.ua/xy/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6fa59c037085c8f1d744da3f0bcf4404_JaffaCakes118

    • Size

      802KB

    • MD5

      6fa59c037085c8f1d744da3f0bcf4404

    • SHA1

      99540076afe5478f0268f5cc35449b510b883fc2

    • SHA256

      adcf0b372228b76e987deecd0f45733e93dee3a798258546612a8f2232044d81

    • SHA512

      23f8d74f6483886f71a939f7ea36dcc476a95115e6d05db0e1fa657495dadd8864f7ff2a3849f8fa3849decd5d8e53e0fce8f0184a1f30bd9f914c1dce9b9f0d

    • SSDEEP

      12288:Cb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hO+mVvldcgcbqSw:7eSHhYRRxOVGcxJBdb1LwvOc

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks