General

  • Target

    e3afbf210187bd44bfb780e111d8cfd8_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240916-a25khazgkg

  • MD5

    e3afbf210187bd44bfb780e111d8cfd8

  • SHA1

    02ccb8a114e8720d9383abaa59b053b129409180

  • SHA256

    42762e16a3b87f499157a15fbc41415f901ceb323cf24aeeeb01abc3906ff232

  • SHA512

    786bfb390b3cdb9434a24d6b40a2e6338befb503653ff039f19c7f9af46de1487b9fa132bbd916b3a0171b241f5e01e0316b37308b7f2c2eb6e0674726ef8c1f

  • SSDEEP

    24576:PwOT1ojLVFxLqbb83cy2bk1cui/Ff6mNQT:P2nVFxLq3kquyJ6dT

Malware Config

Extracted

Family

lokibot

C2

http://pinarvana.tk/iruka/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e3afbf210187bd44bfb780e111d8cfd8_JaffaCakes118

    • Size

      1.1MB

    • MD5

      e3afbf210187bd44bfb780e111d8cfd8

    • SHA1

      02ccb8a114e8720d9383abaa59b053b129409180

    • SHA256

      42762e16a3b87f499157a15fbc41415f901ceb323cf24aeeeb01abc3906ff232

    • SHA512

      786bfb390b3cdb9434a24d6b40a2e6338befb503653ff039f19c7f9af46de1487b9fa132bbd916b3a0171b241f5e01e0316b37308b7f2c2eb6e0674726ef8c1f

    • SSDEEP

      24576:PwOT1ojLVFxLqbb83cy2bk1cui/Ff6mNQT:P2nVFxLq3kquyJ6dT

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks