General

  • Target

    f593168c4825d0bce4f667e02ffc9cda_JaffaCakes118

  • Size

    444KB

  • Sample

    240925-j47x3svbqm

  • MD5

    f593168c4825d0bce4f667e02ffc9cda

  • SHA1

    87906fd801f7360fbfc0df7ce6c8216082060485

  • SHA256

    d436902104ed5f7dcb6bb14ccbfad45257098e2f61e75221ddff0c222e120b5c

  • SHA512

    cdcf35f7ad856b25a486491c12427f8ac9d8892139cdb62121141783a377cc67d7ecba7d851a125a4ce8869c9173961387561cfb42da8b020292843367eecc14

  • SSDEEP

    6144:8Jx5lbOr6oN2Sul670Szqhq3XG56RtV7xfsTOTXCNoOgOJFDo:85lGwLl6zqhqnW6RGQXD1sG

Malware Config

Extracted

Family

lokibot

C2

http://www.altinsoy-tr.com/lion/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f593168c4825d0bce4f667e02ffc9cda_JaffaCakes118

    • Size

      444KB

    • MD5

      f593168c4825d0bce4f667e02ffc9cda

    • SHA1

      87906fd801f7360fbfc0df7ce6c8216082060485

    • SHA256

      d436902104ed5f7dcb6bb14ccbfad45257098e2f61e75221ddff0c222e120b5c

    • SHA512

      cdcf35f7ad856b25a486491c12427f8ac9d8892139cdb62121141783a377cc67d7ecba7d851a125a4ce8869c9173961387561cfb42da8b020292843367eecc14

    • SSDEEP

      6144:8Jx5lbOr6oN2Sul670Szqhq3XG56RtV7xfsTOTXCNoOgOJFDo:85lGwLl6zqhqnW6RGQXD1sG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks