General

  • Target

    f3c99bcd5d51d58a72e0f38c6248e5c1_JaffaCakes118

  • Size

    627KB

  • Sample

    240924-q69m1s1cjf

  • MD5

    f3c99bcd5d51d58a72e0f38c6248e5c1

  • SHA1

    c442a92550fd1c76f259f1edfe02d3ff77147f34

  • SHA256

    5397b13547490ea8775d45eb1b3a2c1400b72674e5d41bcc178ffdc7880f9363

  • SHA512

    90cf20f3de042b4497a3aaa336dde5efa3525e182dff3bb8e8710558e786c37d4511c4fab87d689c581f565b1b81fa8be5e88fc1d71ec3b9396797602b43c425

  • SSDEEP

    12288:X4Y/LMkv3mF88GDH19MkVQ29P71XusZaPfEk1I3KaVZZv:IolvJDfMcJRxbIf3+ZN

Malware Config

Extracted

Family

lokibot

C2

http://marroiq.com/mmc/pin.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f3c99bcd5d51d58a72e0f38c6248e5c1_JaffaCakes118

    • Size

      627KB

    • MD5

      f3c99bcd5d51d58a72e0f38c6248e5c1

    • SHA1

      c442a92550fd1c76f259f1edfe02d3ff77147f34

    • SHA256

      5397b13547490ea8775d45eb1b3a2c1400b72674e5d41bcc178ffdc7880f9363

    • SHA512

      90cf20f3de042b4497a3aaa336dde5efa3525e182dff3bb8e8710558e786c37d4511c4fab87d689c581f565b1b81fa8be5e88fc1d71ec3b9396797602b43c425

    • SSDEEP

      12288:X4Y/LMkv3mF88GDH19MkVQ29P71XusZaPfEk1I3KaVZZv:IolvJDfMcJRxbIf3+ZN

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks