General

  • Target

    f6fa1f643dbbc401c03ebf65b59d5776_JaffaCakes118

  • Size

    721KB

  • Sample

    240925-2cnz1a1dqq

  • MD5

    f6fa1f643dbbc401c03ebf65b59d5776

  • SHA1

    480c194ee988e7b0f4cf11a93223cd5e08dae08e

  • SHA256

    198638daf272a463438a3e2ab8cd01d9761e2bec2338cf9c06ae4a05ab0bbeac

  • SHA512

    2707dc1fac4c7857cc9a46569cdeba8c1f22bcedafcc40bfd644495fae8e333c341727b1297f4e59bf5ecd84e67ad282e46520b2d90f194c07a8cf7ce18d715f

  • SSDEEP

    12288:Dn3nwBeZBUPtcUoJ2JIuDhvVnzcpI0ZHbMF2hiLcRr96:rnLZiPt42JIudVwFZbZcLcR8

Malware Config

Extracted

Family

lokibot

C2

http://195.69.140.147/.op/cr.php/3IAhLIb1TTSzV

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f6fa1f643dbbc401c03ebf65b59d5776_JaffaCakes118

    • Size

      721KB

    • MD5

      f6fa1f643dbbc401c03ebf65b59d5776

    • SHA1

      480c194ee988e7b0f4cf11a93223cd5e08dae08e

    • SHA256

      198638daf272a463438a3e2ab8cd01d9761e2bec2338cf9c06ae4a05ab0bbeac

    • SHA512

      2707dc1fac4c7857cc9a46569cdeba8c1f22bcedafcc40bfd644495fae8e333c341727b1297f4e59bf5ecd84e67ad282e46520b2d90f194c07a8cf7ce18d715f

    • SSDEEP

      12288:Dn3nwBeZBUPtcUoJ2JIuDhvVnzcpI0ZHbMF2hiLcRr96:rnLZiPt42JIudVwFZbZcLcR8

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks