General

  • Target

    9427ac98d81e3c299a1708d84e3ba54e_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240604-kbr7laag6w

  • MD5

    9427ac98d81e3c299a1708d84e3ba54e

  • SHA1

    ca254d31bb2ef6e24ba38457040fd8b29f95e61c

  • SHA256

    2947048e9ba8decf638035851c0f576cbf82afc5463d6610eee64bd34f53f4e1

  • SHA512

    db6e1893d3e065bc05c952ae0069a3e65f1108148f41e040afa79c7b1e8fd855ad0c06016c71ccbf87c8a183d87e11e7e13a733e3ffabf4cd4e66e646098ca7e

  • SSDEEP

    24576:Cu6Jx3O0c+JY5UZ+XC0kGso/WatVVpM8ilDWY:kI0c++OCvkGsUWatfY

Malware Config

Extracted

Family

lokibot

C2

http://nvent.icu/Versace/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9427ac98d81e3c299a1708d84e3ba54e_JaffaCakes118

    • Size

      1.1MB

    • MD5

      9427ac98d81e3c299a1708d84e3ba54e

    • SHA1

      ca254d31bb2ef6e24ba38457040fd8b29f95e61c

    • SHA256

      2947048e9ba8decf638035851c0f576cbf82afc5463d6610eee64bd34f53f4e1

    • SHA512

      db6e1893d3e065bc05c952ae0069a3e65f1108148f41e040afa79c7b1e8fd855ad0c06016c71ccbf87c8a183d87e11e7e13a733e3ffabf4cd4e66e646098ca7e

    • SSDEEP

      24576:Cu6Jx3O0c+JY5UZ+XC0kGso/WatVVpM8ilDWY:kI0c++OCvkGsUWatfY

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks