General

  • Target

    a3d0110724e2a03abc79aa64b0b48e1d_JaffaCakes118

  • Size

    691KB

  • Sample

    240613-e1p6msxfqr

  • MD5

    a3d0110724e2a03abc79aa64b0b48e1d

  • SHA1

    a62e44d78c93d8a43e6ef9482f9da5ad852c7aa7

  • SHA256

    38cc5994cb75abd23266c12a968c182da34342a66c6dc660b0068cb4b7aa806a

  • SHA512

    14b18e967a2ea40d1b1978b90d482a33d886f756109a85e5bbf21982d043adec4d04db0f3fe95c1a8b78e911a22b327cf2a6a802df79c3f2c4f60957697e6d95

  • SSDEEP

    12288:eQ5e6wJKHHFD0sxCdBkoVzzP3/138GmQNlLAUjDwE1sNEze6wbl:eAe6wJKnFD0coVzzPx8AL1vwE6NEze6o

Malware Config

Extracted

Family

lokibot

C2

http://185.82.200.16/~zadmin/ema/cache.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a3d0110724e2a03abc79aa64b0b48e1d_JaffaCakes118

    • Size

      691KB

    • MD5

      a3d0110724e2a03abc79aa64b0b48e1d

    • SHA1

      a62e44d78c93d8a43e6ef9482f9da5ad852c7aa7

    • SHA256

      38cc5994cb75abd23266c12a968c182da34342a66c6dc660b0068cb4b7aa806a

    • SHA512

      14b18e967a2ea40d1b1978b90d482a33d886f756109a85e5bbf21982d043adec4d04db0f3fe95c1a8b78e911a22b327cf2a6a802df79c3f2c4f60957697e6d95

    • SSDEEP

      12288:eQ5e6wJKHHFD0sxCdBkoVzzP3/138GmQNlLAUjDwE1sNEze6wbl:eAe6wJKnFD0coVzzPx8AL1vwE6NEze6o

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks