General

  • Target

    222da832315011887a35d13f512bc068_JaffaCakes118

  • Size

    660KB

  • Sample

    240728-za1vnsxcmh

  • MD5

    222da832315011887a35d13f512bc068

  • SHA1

    ed28832b7a8d57db23460dcddea412ef6b7c76ff

  • SHA256

    bcaa841b67dcb813bbc4a7dc46df9922b03dd9c4c152c4e48190fdbc6caff0c5

  • SHA512

    1358f5d57ac7b0dd181fd8f10cbd138b8510c63840354af8dde63f94ef2e97208233b6555fe5002c8b18b0fa96757f42fed7d2f11e43ade4f3544339b85e9547

  • SSDEEP

    12288:H1eRRAfxCIUnyNOI/SN/HWQZUp9Fq3owpT:ViRO8nyNOI0u77kF

Malware Config

Extracted

Family

lokibot

C2

http://195.69.140.147/.op/cr.php/xUSLz59kCLo7F

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      222da832315011887a35d13f512bc068_JaffaCakes118

    • Size

      660KB

    • MD5

      222da832315011887a35d13f512bc068

    • SHA1

      ed28832b7a8d57db23460dcddea412ef6b7c76ff

    • SHA256

      bcaa841b67dcb813bbc4a7dc46df9922b03dd9c4c152c4e48190fdbc6caff0c5

    • SHA512

      1358f5d57ac7b0dd181fd8f10cbd138b8510c63840354af8dde63f94ef2e97208233b6555fe5002c8b18b0fa96757f42fed7d2f11e43ade4f3544339b85e9547

    • SSDEEP

      12288:H1eRRAfxCIUnyNOI/SN/HWQZUp9Fq3owpT:ViRO8nyNOI0u77kF

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks