General

  • Target

    812755809f8c0ad0bab7d92ec35505fe_JaffaCakes118

  • Size

    383KB

  • Sample

    240529-shd8baaa5w

  • MD5

    812755809f8c0ad0bab7d92ec35505fe

  • SHA1

    a0fbad927a3cf64351190de723ee344131c73dff

  • SHA256

    684458091df822176be461dc79e10f6ba4a1665ec240c9d356ad0a6d8df50572

  • SHA512

    4158648d828528281e53600e5246794e8c571fd131943d2765ce2bd705ff0c3f9ad2d131acec1eeb95043203bb5df10af8c4930ab070cc3cd859c3f91b737a8f

  • SSDEEP

    6144:eLCwk7wqDrxpnzXuwptTjcgZ/T/BhpTjl4PBtabOr35eWhgjul:eLCwk7wqXxpnzX57EM/Bh9jlv70

Malware Config

Extracted

Family

lokibot

C2

http://www.matantalbenna.com/.legolass/fine/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      812755809f8c0ad0bab7d92ec35505fe_JaffaCakes118

    • Size

      383KB

    • MD5

      812755809f8c0ad0bab7d92ec35505fe

    • SHA1

      a0fbad927a3cf64351190de723ee344131c73dff

    • SHA256

      684458091df822176be461dc79e10f6ba4a1665ec240c9d356ad0a6d8df50572

    • SHA512

      4158648d828528281e53600e5246794e8c571fd131943d2765ce2bd705ff0c3f9ad2d131acec1eeb95043203bb5df10af8c4930ab070cc3cd859c3f91b737a8f

    • SSDEEP

      6144:eLCwk7wqDrxpnzXuwptTjcgZ/T/BhpTjl4PBtabOr35eWhgjul:eLCwk7wqXxpnzX57EM/Bh9jlv70

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks