General

  • Target

    edd1f32ab41d953740f326a0c55aa5af_JaffaCakes118

  • Size

    419KB

  • Sample

    240920-r5gfhssdjm

  • MD5

    edd1f32ab41d953740f326a0c55aa5af

  • SHA1

    967748225c319154d4e6f9a044e8fc2ef00f3f4d

  • SHA256

    ebe063d672883cc85fbe58f4978102de6089b749b2c2f865b10048bf7305cdc1

  • SHA512

    7d5d22c89f2e63560dadfaa9767c673c49a0ac160463785ecea3bba9564fea2637839128a16905784c7f8227195f21ee1661058277292aa0f8e43d04e0cb77ca

  • SSDEEP

    3072:Igiy3mcNuTtU3Gcuam57akHkbHZ3g/DvP+tBlixK9kgr1vB7MOsUDYPeih+t0e88:Im2ce01OkemmMkivB1z8g4ACQRwu

Malware Config

Extracted

Family

lokibot

C2

http://www.stanhost.top/panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      edd1f32ab41d953740f326a0c55aa5af_JaffaCakes118

    • Size

      419KB

    • MD5

      edd1f32ab41d953740f326a0c55aa5af

    • SHA1

      967748225c319154d4e6f9a044e8fc2ef00f3f4d

    • SHA256

      ebe063d672883cc85fbe58f4978102de6089b749b2c2f865b10048bf7305cdc1

    • SHA512

      7d5d22c89f2e63560dadfaa9767c673c49a0ac160463785ecea3bba9564fea2637839128a16905784c7f8227195f21ee1661058277292aa0f8e43d04e0cb77ca

    • SSDEEP

      3072:Igiy3mcNuTtU3Gcuam57akHkbHZ3g/DvP+tBlixK9kgr1vB7MOsUDYPeih+t0e88:Im2ce01OkemmMkivB1z8g4ACQRwu

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks