General

  • Target

    714ca2b0f96f091d43959e9ce99a1057_JaffaCakes118

  • Size

    236KB

  • Sample

    240525-jmh8dsah3v

  • MD5

    714ca2b0f96f091d43959e9ce99a1057

  • SHA1

    f0794181fc2ad57324628ef1be7d15aa3f5ed6de

  • SHA256

    d180cd252c0d7574a0805a8c2bb3f4a9ca6b0a85ef8d46a0b3941e6ce8b514a4

  • SHA512

    221c34aabdb47dd0ff0bd42b4fcf1fe861b84a1ea597515b3c46a54d605a3f5063e5c2212c2bf73f261ec0c57257fb9e099822b0555e8b1a3c4fc604e4441737

  • SSDEEP

    6144:vsVmRO5FnLtwLsUdXH4pWuo50eAv21Vm:kVWGZfaq4V

Malware Config

Extracted

Family

lokibot

C2

http://ongertelles.com/sasha/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      714ca2b0f96f091d43959e9ce99a1057_JaffaCakes118

    • Size

      236KB

    • MD5

      714ca2b0f96f091d43959e9ce99a1057

    • SHA1

      f0794181fc2ad57324628ef1be7d15aa3f5ed6de

    • SHA256

      d180cd252c0d7574a0805a8c2bb3f4a9ca6b0a85ef8d46a0b3941e6ce8b514a4

    • SHA512

      221c34aabdb47dd0ff0bd42b4fcf1fe861b84a1ea597515b3c46a54d605a3f5063e5c2212c2bf73f261ec0c57257fb9e099822b0555e8b1a3c4fc604e4441737

    • SSDEEP

      6144:vsVmRO5FnLtwLsUdXH4pWuo50eAv21Vm:kVWGZfaq4V

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks