General

  • Target

    7dd1d4c55c7e8ee669f31b6467535058_JaffaCakes118

  • Size

    1.0MB

  • Sample

    240528-v98mcadf61

  • MD5

    7dd1d4c55c7e8ee669f31b6467535058

  • SHA1

    5e661cb0b167b870afbe5021ca360df648093505

  • SHA256

    3a20068e0f3ab8b9735f12b0a5475b01e9f5635acd80961248535531ff523bd4

  • SHA512

    524a499ac8138f1e79410abd8de58c3357aa22f5709ba4585d08959fb0f0aa0ce0d24c486c10c430f9965ab34eddf54811bf50d6db31d726be5b19ec9c553506

  • SSDEEP

    24576:YEd/ZEfUXF3yHcKKI7McIFQY2+v0Xe89vtbC:YEd/Z7dpQu0Xe8W

Malware Config

Extracted

Family

lokibot

C2

http://ciston.nut.cc/bis-02/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7dd1d4c55c7e8ee669f31b6467535058_JaffaCakes118

    • Size

      1.0MB

    • MD5

      7dd1d4c55c7e8ee669f31b6467535058

    • SHA1

      5e661cb0b167b870afbe5021ca360df648093505

    • SHA256

      3a20068e0f3ab8b9735f12b0a5475b01e9f5635acd80961248535531ff523bd4

    • SHA512

      524a499ac8138f1e79410abd8de58c3357aa22f5709ba4585d08959fb0f0aa0ce0d24c486c10c430f9965ab34eddf54811bf50d6db31d726be5b19ec9c553506

    • SSDEEP

      24576:YEd/ZEfUXF3yHcKKI7McIFQY2+v0Xe89vtbC:YEd/Z7dpQu0Xe8W

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Accesses Microsoft Outlook profiles

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks