General

  • Target

    8e724008592602c3c3b986414dec1903_JaffaCakes118

  • Size

    379KB

  • Sample

    240602-r65jqsfa4t

  • MD5

    8e724008592602c3c3b986414dec1903

  • SHA1

    65b14bf2529a276c663dd4fd285d1ff39168ee4c

  • SHA256

    9e8614222e6ac4a46a83fcdeae6f494add37b864845fa195cb6ecd5032235726

  • SHA512

    74c0a5e68fb1f17d25f7f47cc531385515ccb4c8054af1137b7e566334afdb36a7a2674b96177936fe385ea413e1322f22ea0d385a6de49e49c671c797deecfb

  • SSDEEP

    3072:us5E/H2jNjXfGixul7tupBKhR8qK1dh7TmEhMUHualvzrV13oLrdHDe+FIWFIOXI:EoNjvGqkupwYXLmEaUHuoWVLe5SSVZ1

Malware Config

Extracted

Family

lokibot

C2

http://pendarcc.ir/wp-includes/ID3/mod/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8e724008592602c3c3b986414dec1903_JaffaCakes118

    • Size

      379KB

    • MD5

      8e724008592602c3c3b986414dec1903

    • SHA1

      65b14bf2529a276c663dd4fd285d1ff39168ee4c

    • SHA256

      9e8614222e6ac4a46a83fcdeae6f494add37b864845fa195cb6ecd5032235726

    • SHA512

      74c0a5e68fb1f17d25f7f47cc531385515ccb4c8054af1137b7e566334afdb36a7a2674b96177936fe385ea413e1322f22ea0d385a6de49e49c671c797deecfb

    • SSDEEP

      3072:us5E/H2jNjXfGixul7tupBKhR8qK1dh7TmEhMUHualvzrV13oLrdHDe+FIWFIOXI:EoNjvGqkupwYXLmEaUHuoWVLe5SSVZ1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks