General

  • Target

    8eeb73425480a7de79f7db7b76b51eb3_JaffaCakes118

  • Size

    556KB

  • Sample

    240602-wgh2nahh9y

  • MD5

    8eeb73425480a7de79f7db7b76b51eb3

  • SHA1

    02e0c5d0270b06ebcda545301b21921a93bc3ea5

  • SHA256

    f9ac3066d1d7b3f72a65d8940724c360828b66353a2aa5497136d87d404a2983

  • SHA512

    f2016a484531faca5959c0b95c208f63ad60b864934e9512440fe1c712dfd9c36bffece60b18e4fa9fe3cd1d73952b8d09e998637c898695877d806c19b0971b

  • SSDEEP

    12288:cNZ8FSO62Ri6o+vMRjY1JcIWMtyYYgbHsrlrS/c:qdZgcIwS/c

Malware Config

Extracted

Family

lokibot

C2

https://publicspeaking.co.id/okoye/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8eeb73425480a7de79f7db7b76b51eb3_JaffaCakes118

    • Size

      556KB

    • MD5

      8eeb73425480a7de79f7db7b76b51eb3

    • SHA1

      02e0c5d0270b06ebcda545301b21921a93bc3ea5

    • SHA256

      f9ac3066d1d7b3f72a65d8940724c360828b66353a2aa5497136d87d404a2983

    • SHA512

      f2016a484531faca5959c0b95c208f63ad60b864934e9512440fe1c712dfd9c36bffece60b18e4fa9fe3cd1d73952b8d09e998637c898695877d806c19b0971b

    • SSDEEP

      12288:cNZ8FSO62Ri6o+vMRjY1JcIWMtyYYgbHsrlrS/c:qdZgcIwS/c

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks