General

  • Target

    f331352e3dc5c6d82a880ba29e90ced7_JaffaCakes118

  • Size

    790KB

  • Sample

    240924-j1t7tawhrj

  • MD5

    f331352e3dc5c6d82a880ba29e90ced7

  • SHA1

    0eb0c42920b85cefbca199fd6ddb3a247d7badcd

  • SHA256

    82dddeb64ec22218ca5174cbcbc536e51e760f786c4b8a8851a4784beae75dfc

  • SHA512

    29d393d67996d10cb4e4608c5943f470246f9fcf77b8ca6121eb6ebcde573d15c4d51c96669216555e9f983f2a81c1798b60f8164a1c49ee2fa20ccfffcc631d

  • SSDEEP

    24576:31WEL+pgWHeBjIdW27Y03mydxco6/iQHo:31WVE1y

Malware Config

Extracted

Family

lokibot

C2

https://duclongetc.com/.o1/playbook/onelove/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f331352e3dc5c6d82a880ba29e90ced7_JaffaCakes118

    • Size

      790KB

    • MD5

      f331352e3dc5c6d82a880ba29e90ced7

    • SHA1

      0eb0c42920b85cefbca199fd6ddb3a247d7badcd

    • SHA256

      82dddeb64ec22218ca5174cbcbc536e51e760f786c4b8a8851a4784beae75dfc

    • SHA512

      29d393d67996d10cb4e4608c5943f470246f9fcf77b8ca6121eb6ebcde573d15c4d51c96669216555e9f983f2a81c1798b60f8164a1c49ee2fa20ccfffcc631d

    • SSDEEP

      24576:31WEL+pgWHeBjIdW27Y03mydxco6/iQHo:31WVE1y

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks