General

  • Target

    415654e080811ae1e85b042af31e801e_JaffaCakes118

  • Size

    423KB

  • Sample

    240713-mqn5lazbrc

  • MD5

    415654e080811ae1e85b042af31e801e

  • SHA1

    616375f7454fb501f8f2173fcf61f1737a584bd9

  • SHA256

    3cc27362dc150bc6525c0872ec49b09cdd4372d6ba4efdd50cc2b3af1297599e

  • SHA512

    869c6b969efbbc5f8fa3fbc3d1a88c9c26d718f9beae4e278058d9954c97e0a439fdeeca4c6cdaf37930c9d4d5f1e3af0a07c06346c70b2744175b1c6df1586d

  • SSDEEP

    6144:GvaVGofqIwPvv90kWnrrF1A05A/np18BO4+vCv9xdRVwqBZX:GSVurPvvhWnrr/HG/nI8zC1DBZ

Malware Config

Extracted

Family

lokibot

C2

http://51.195.53.221/p.php/lJ606117cGKwY

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      415654e080811ae1e85b042af31e801e_JaffaCakes118

    • Size

      423KB

    • MD5

      415654e080811ae1e85b042af31e801e

    • SHA1

      616375f7454fb501f8f2173fcf61f1737a584bd9

    • SHA256

      3cc27362dc150bc6525c0872ec49b09cdd4372d6ba4efdd50cc2b3af1297599e

    • SHA512

      869c6b969efbbc5f8fa3fbc3d1a88c9c26d718f9beae4e278058d9954c97e0a439fdeeca4c6cdaf37930c9d4d5f1e3af0a07c06346c70b2744175b1c6df1586d

    • SSDEEP

      6144:GvaVGofqIwPvv90kWnrrF1A05A/np18BO4+vCv9xdRVwqBZX:GSVurPvvhWnrr/HG/nI8zC1DBZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks