General

  • Target

    7d5cc28894986820a784ecef9d580ccf_JaffaCakes118

  • Size

    535KB

  • Sample

    240528-r9d6ysaf39

  • MD5

    7d5cc28894986820a784ecef9d580ccf

  • SHA1

    7e26300016fd98f49480192c37e6936be45fd76f

  • SHA256

    7c4fd99f93bdbbfd9c527abcbb90bebd1596f932472a35c8e101b488ec09e7b2

  • SHA512

    6a844cc670d81537f2a219c12fe59788d8384d2a9eb91c787fa20d2ba315915259b88bf5c200aa16b05aebf45183936e36541feec42e4ba4133efc1b70b8db75

  • SSDEEP

    6144:+MK9gBn27sEcAvx+rovKXFYCJpXESOoPoGqbKsSomrftWOKfetwTZ:1K9guvIbqSpVO6Ebk1fLKmtAZ

Malware Config

Extracted

Family

lokibot

C2

http://fueda.info/sky/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7d5cc28894986820a784ecef9d580ccf_JaffaCakes118

    • Size

      535KB

    • MD5

      7d5cc28894986820a784ecef9d580ccf

    • SHA1

      7e26300016fd98f49480192c37e6936be45fd76f

    • SHA256

      7c4fd99f93bdbbfd9c527abcbb90bebd1596f932472a35c8e101b488ec09e7b2

    • SHA512

      6a844cc670d81537f2a219c12fe59788d8384d2a9eb91c787fa20d2ba315915259b88bf5c200aa16b05aebf45183936e36541feec42e4ba4133efc1b70b8db75

    • SSDEEP

      6144:+MK9gBn27sEcAvx+rovKXFYCJpXESOoPoGqbKsSomrftWOKfetwTZ:1K9guvIbqSpVO6Ebk1fLKmtAZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks