General

  • Target

    317cb6e4f1f4545c67f28c3bf7e1dbda_JaffaCakes118

  • Size

    468KB

  • Sample

    240709-w416razfja

  • MD5

    317cb6e4f1f4545c67f28c3bf7e1dbda

  • SHA1

    dc061243fa1dbee5ee2c64fd9552e9ac6ed846c4

  • SHA256

    b716ebdbe1fc336fb934f879c1d0966c8aa61ac16d52edf1bc687f9bd1d2dfde

  • SHA512

    e659ba4fb8a62d330bf9961544a59283c3f59a0130e8fcb4bddb3b1d570fca8181ccd0c6ade5198708af2f1410f436818246a3de54489b230911c585d485bc42

  • SSDEEP

    12288:ZSNXeOH/yoGpKbUqq8hwnE8LoWgU8KwmW7LoFok9j/lUb:oNPBMUUqKE88KtWXoSkte

Malware Config

Extracted

Family

lokibot

C2

http://51.195.53.221/p.php/2dY9AG7m0LNWP

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Bm6ssTH5I9vTVqF.exe

    • Size

      526KB

    • MD5

      85bea6e356c3c21984099b9c0dc186e4

    • SHA1

      e52f7214470c9dd0d28dfa0ce75e9f124641276e

    • SHA256

      ed6b6473d09425f88d6ef29939f2eb65e9566b91571d6cb6a366f689d4b667c0

    • SHA512

      7f04f07afdb6a0be86f7fe00b1afd77414620e5df845f99acf8b7b4be6a4298b30bf7fa6f7438e7a8445a31a5aa9d5f9da55ec6f22098078549f3efc7ebeaf93

    • SSDEEP

      12288:qGYBE6fvxnFOjD/JfZX3erjsSE83jpnnqPtxmFy4lpiVw:GlNwNR3erYSx3jtejciVw

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks