General

  • Target

    f32385b2aaaf03a2709f4176ef1d3041_JaffaCakes118

  • Size

    514KB

  • Sample

    240924-jfn53azbmf

  • MD5

    f32385b2aaaf03a2709f4176ef1d3041

  • SHA1

    0a5ecb3938d96828c036888ebcd17dc771cdc545

  • SHA256

    4b92829a80befc676cf6f43fc5b7af9037a23e8d4f33b21032988f34ef7b15cc

  • SHA512

    dd7e8f2bfe832e671eeab01afd8eea9199fb9d2fc5f46c31f46db2ccd41430b55fab85f84f5bbcb21b8b296bad0a9b433404c99deb6d1503302f7e0c540abc9d

  • SSDEEP

    6144:WZ6BmGOhy1aImaiwSA4wp+vXTpCRLu2xwsYSBAz:W0wy1aIpi1j/Tp+u3sk

Malware Config

Extracted

Family

lokibot

C2

http://ipqbook.com/emmagroup/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f32385b2aaaf03a2709f4176ef1d3041_JaffaCakes118

    • Size

      514KB

    • MD5

      f32385b2aaaf03a2709f4176ef1d3041

    • SHA1

      0a5ecb3938d96828c036888ebcd17dc771cdc545

    • SHA256

      4b92829a80befc676cf6f43fc5b7af9037a23e8d4f33b21032988f34ef7b15cc

    • SHA512

      dd7e8f2bfe832e671eeab01afd8eea9199fb9d2fc5f46c31f46db2ccd41430b55fab85f84f5bbcb21b8b296bad0a9b433404c99deb6d1503302f7e0c540abc9d

    • SSDEEP

      6144:WZ6BmGOhy1aImaiwSA4wp+vXTpCRLu2xwsYSBAz:W0wy1aIpi1j/Tp+u3sk

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks