General

  • Target

    81362f74cc518876fb94917b2b9f9fa9_JaffaCakes118

  • Size

    238KB

  • Sample

    240529-s1dphaaf31

  • MD5

    81362f74cc518876fb94917b2b9f9fa9

  • SHA1

    6c376f36bb81345f345c917a9a45e113c3323c8e

  • SHA256

    7400624f227c0d18b4385573cd6a1c2f0083505787ca557aeddd89ee29f3e17b

  • SHA512

    89bb62b67e091ae09ed1c30ce620129cbf680cb8cc2e5a2671fbf2e791774031670ab8bf8447a10d855a2dad1884c6882dbb81f5c3477a22feb489a592a2d7ca

  • SSDEEP

    6144:ZqXKtSh0YXN262D7uGli1WFnCt1o1eOIz:ZqC80Yw7mGl2WFyzvz

Malware Config

Extracted

Family

lokibot

C2

http://31.220.40.22/~lahtipr1/lenzman/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      81362f74cc518876fb94917b2b9f9fa9_JaffaCakes118

    • Size

      238KB

    • MD5

      81362f74cc518876fb94917b2b9f9fa9

    • SHA1

      6c376f36bb81345f345c917a9a45e113c3323c8e

    • SHA256

      7400624f227c0d18b4385573cd6a1c2f0083505787ca557aeddd89ee29f3e17b

    • SHA512

      89bb62b67e091ae09ed1c30ce620129cbf680cb8cc2e5a2671fbf2e791774031670ab8bf8447a10d855a2dad1884c6882dbb81f5c3477a22feb489a592a2d7ca

    • SSDEEP

      6144:ZqXKtSh0YXN262D7uGli1WFnCt1o1eOIz:ZqC80Yw7mGl2WFyzvz

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks