General

  • Target

    16a83eb2d056c892415fe699147f3108_JaffaCakes118

  • Size

    812KB

  • Sample

    241005-hxg8eawdlg

  • MD5

    16a83eb2d056c892415fe699147f3108

  • SHA1

    d22965da129c691322b6517f4dd950a1cfcfbcbe

  • SHA256

    e945ce6559ccbd289b302a72ab4e659941e831c9857f9875bfe80e594797dfec

  • SHA512

    af42469c5a2ed19cca40fd6b7c152af4d258a5234b3e3c793e971e27dd2fe0c599cb28b32e47850fe6151a6a225aeeeceb3907a544b6d56364f7bb82d3cafe64

  • SSDEEP

    12288:C8zo/sLX/2p9OqdHK7zJGtebUHFeyCL4gcImiWcqZHA4YabEjV0:C8UW/TqwFnu5SkzncqZ8C4

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd14/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      16a83eb2d056c892415fe699147f3108_JaffaCakes118

    • Size

      812KB

    • MD5

      16a83eb2d056c892415fe699147f3108

    • SHA1

      d22965da129c691322b6517f4dd950a1cfcfbcbe

    • SHA256

      e945ce6559ccbd289b302a72ab4e659941e831c9857f9875bfe80e594797dfec

    • SHA512

      af42469c5a2ed19cca40fd6b7c152af4d258a5234b3e3c793e971e27dd2fe0c599cb28b32e47850fe6151a6a225aeeeceb3907a544b6d56364f7bb82d3cafe64

    • SSDEEP

      12288:C8zo/sLX/2p9OqdHK7zJGtebUHFeyCL4gcImiWcqZHA4YabEjV0:C8UW/TqwFnu5SkzncqZ8C4

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks