General

  • Target

    c51f026c9d7e33819a7316931486f61f_JaffaCakes118

  • Size

    456KB

  • Sample

    240827-q6c9tatema

  • MD5

    c51f026c9d7e33819a7316931486f61f

  • SHA1

    603e3138e0b5737adccc73a576812f2610e744dc

  • SHA256

    55a48d18d84f9c95d24fa263972e320b32cda84247bf0e4fa505f138033ec4f3

  • SHA512

    519fa21a5732c5a93cc54be65bf0c017f0e075e175fa23a96ff3423907adae1ecaa1185050a2ac11f10e1e193e375ce667312828c59c36c03b147764862c3b6e

  • SSDEEP

    6144:qtQZqm15Jt86dy5yZ8cqqNyBdlRSz3wUev2Gw:qtsu6dTqxzG3ce

Malware Config

Extracted

Family

lokibot

C2

http://umarguzardijye.com/work/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c51f026c9d7e33819a7316931486f61f_JaffaCakes118

    • Size

      456KB

    • MD5

      c51f026c9d7e33819a7316931486f61f

    • SHA1

      603e3138e0b5737adccc73a576812f2610e744dc

    • SHA256

      55a48d18d84f9c95d24fa263972e320b32cda84247bf0e4fa505f138033ec4f3

    • SHA512

      519fa21a5732c5a93cc54be65bf0c017f0e075e175fa23a96ff3423907adae1ecaa1185050a2ac11f10e1e193e375ce667312828c59c36c03b147764862c3b6e

    • SSDEEP

      6144:qtQZqm15Jt86dy5yZ8cqqNyBdlRSz3wUev2Gw:qtsu6dTqxzG3ce

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks