General

  • Target

    f4c4cdf235207edf81bff693e6bebe09_JaffaCakes118

  • Size

    895KB

  • Sample

    240925-ak55pstcnj

  • MD5

    f4c4cdf235207edf81bff693e6bebe09

  • SHA1

    0334a706b2c2c18234ae7a82b264f924ffd7b89a

  • SHA256

    1ac1653b9124d0914ef509e94d452036461de32b7abf3e170403bcd675c0f7c6

  • SHA512

    29984559563711fdfae8ec11ae192d0751c83f576b81a91550fba4520f725380c63a953ce3408ec37f79d10a9d5e90fa9f7dbbabd9fe316bbdba9ee56e45bc7b

  • SSDEEP

    24576:WoGe3MxT5GWYiWU/3c2st1W7b0pEbjnXEIGnBWjM1:WtLuWYhNOX8d1

Malware Config

Extracted

Family

lokibot

C2

http://eleletieleleparthard.gq/banky/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f4c4cdf235207edf81bff693e6bebe09_JaffaCakes118

    • Size

      895KB

    • MD5

      f4c4cdf235207edf81bff693e6bebe09

    • SHA1

      0334a706b2c2c18234ae7a82b264f924ffd7b89a

    • SHA256

      1ac1653b9124d0914ef509e94d452036461de32b7abf3e170403bcd675c0f7c6

    • SHA512

      29984559563711fdfae8ec11ae192d0751c83f576b81a91550fba4520f725380c63a953ce3408ec37f79d10a9d5e90fa9f7dbbabd9fe316bbdba9ee56e45bc7b

    • SSDEEP

      24576:WoGe3MxT5GWYiWU/3c2st1W7b0pEbjnXEIGnBWjM1:WtLuWYhNOX8d1

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks