General

  • Target

    b51dda97bad49167ef89d44a050ef5d5_JaffaCakes118

  • Size

    562KB

  • Sample

    240616-zjwmba1crn

  • MD5

    b51dda97bad49167ef89d44a050ef5d5

  • SHA1

    0831cbdcc4cee218b129a37aad03ba35cd897bac

  • SHA256

    27ffa179ec58ffa4b67fd720d0d8e2fc7474fccfc10a4da217babb4822a74c78

  • SHA512

    6a872b6a349a502d27c834e883ddc0a313f55ceae7ce8bebad4b4e5752899b4f2e6ad0892744a2967aab5c344b32ae9a77ece1a4f06da5eb9631093f41f74c34

  • SSDEEP

    6144:Oq3XLcSjwZma2JO8sa/z1/9liBF5HKykQ/oA8cA+tFcdfsu2IgeOoJQSjleWQgti:RrcplMB69OPgeOo3lnt0D

Malware Config

Extracted

Family

lokibot

C2

http://fortindo-fsm.com/azor/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b51dda97bad49167ef89d44a050ef5d5_JaffaCakes118

    • Size

      562KB

    • MD5

      b51dda97bad49167ef89d44a050ef5d5

    • SHA1

      0831cbdcc4cee218b129a37aad03ba35cd897bac

    • SHA256

      27ffa179ec58ffa4b67fd720d0d8e2fc7474fccfc10a4da217babb4822a74c78

    • SHA512

      6a872b6a349a502d27c834e883ddc0a313f55ceae7ce8bebad4b4e5752899b4f2e6ad0892744a2967aab5c344b32ae9a77ece1a4f06da5eb9631093f41f74c34

    • SSDEEP

      6144:Oq3XLcSjwZma2JO8sa/z1/9liBF5HKykQ/oA8cA+tFcdfsu2IgeOoJQSjleWQgti:RrcplMB69OPgeOo3lnt0D

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks