General

  • Target

    8d8f08dc79aa980080b6eb9378c7582b_JaffaCakes118

  • Size

    238KB

  • Sample

    240602-k24nbagg4z

  • MD5

    8d8f08dc79aa980080b6eb9378c7582b

  • SHA1

    24b938abab44fdd589cb34c4b6e4569cb8f78349

  • SHA256

    117df916eb525865e7621d6b254ba0150edaf9855c4b84e789365497eb1de667

  • SHA512

    c1da8defaa3454e6ab9831cd76357125aab4bdd787035f7b97e91fbae9253844f57e54813fdbc8c6e71cdbbc371f878e6b7461cc8691d755685becc632d0c831

  • SSDEEP

    6144:ag3UpwJoNdIsz0BowQulj+MXW3rK4YJ18FS/BYVMbvBBBi:aNwJCzJf2+Mm3zY38FS/623

Malware Config

Extracted

Family

lokibot

C2

http://31.220.40.22/~lahtipre/austino/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8d8f08dc79aa980080b6eb9378c7582b_JaffaCakes118

    • Size

      238KB

    • MD5

      8d8f08dc79aa980080b6eb9378c7582b

    • SHA1

      24b938abab44fdd589cb34c4b6e4569cb8f78349

    • SHA256

      117df916eb525865e7621d6b254ba0150edaf9855c4b84e789365497eb1de667

    • SHA512

      c1da8defaa3454e6ab9831cd76357125aab4bdd787035f7b97e91fbae9253844f57e54813fdbc8c6e71cdbbc371f878e6b7461cc8691d755685becc632d0c831

    • SSDEEP

      6144:ag3UpwJoNdIsz0BowQulj+MXW3rK4YJ18FS/BYVMbvBBBi:aNwJCzJf2+Mm3zY38FS/623

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks