General

  • Target

    55888d7c8305ccc5d2547f02ea5efe1b_JaffaCakes118

  • Size

    302KB

  • Sample

    240718-bb6kjsxfkr

  • MD5

    55888d7c8305ccc5d2547f02ea5efe1b

  • SHA1

    a3c7d3144f89595380d755ef4d806737028458a6

  • SHA256

    572e22283bac84f3439061bf4a127fc5fc3be6c9bb61d0b28190b231098ca9ee

  • SHA512

    035dfd42884a901fb7fc421c8ee21dc91042a971a1cac2a856be3ea3e4d77087c7b67e012bec2f9d7af3a2670d40a716e00772812cdb42f034bf87f1765c0c2b

  • SSDEEP

    6144:1gn8irYJhSC4KdDKoP3I5qAQELNmCIKb:emJh/lI5qAXNmCIK

Malware Config

Extracted

Family

lokibot

C2

http://umarguzardijye.com/work/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      55888d7c8305ccc5d2547f02ea5efe1b_JaffaCakes118

    • Size

      302KB

    • MD5

      55888d7c8305ccc5d2547f02ea5efe1b

    • SHA1

      a3c7d3144f89595380d755ef4d806737028458a6

    • SHA256

      572e22283bac84f3439061bf4a127fc5fc3be6c9bb61d0b28190b231098ca9ee

    • SHA512

      035dfd42884a901fb7fc421c8ee21dc91042a971a1cac2a856be3ea3e4d77087c7b67e012bec2f9d7af3a2670d40a716e00772812cdb42f034bf87f1765c0c2b

    • SSDEEP

      6144:1gn8irYJhSC4KdDKoP3I5qAQELNmCIKb:emJh/lI5qAXNmCIK

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks