General

  • Target

    1edf1882d31480d1bdd67cffcda75e70_JaffaCakes118

  • Size

    245KB

  • Sample

    241008-bzpa6sscmk

  • MD5

    1edf1882d31480d1bdd67cffcda75e70

  • SHA1

    5f986ceefe1e631fe0e0839dc2b60ef6d5dd9991

  • SHA256

    4c93753850ca369e98ec8261b24ddc1568eeb2bbf7950eb2649ab5e7e087ca25

  • SHA512

    af555643be5885254a6469dcf3735f3556c3d110f3dac4768f3ebde4c060474e8561b0c4e4ff23afbfe885035952c557ef906f932becea6567ec17d079694e36

  • SSDEEP

    3072:sFWfOw5lrGBSXZdPSWStZbD0KHwfhoWH9NgmXUonEnnnnnnnnnnnnnnnnnnnnnnA:sF0NZdqdL0KHSho69NgmWZCOTg7m72Dp

Malware Config

Extracted

Family

lokibot

C2

http://brokenethicalgod.cf/Office1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      1edf1882d31480d1bdd67cffcda75e70_JaffaCakes118

    • Size

      245KB

    • MD5

      1edf1882d31480d1bdd67cffcda75e70

    • SHA1

      5f986ceefe1e631fe0e0839dc2b60ef6d5dd9991

    • SHA256

      4c93753850ca369e98ec8261b24ddc1568eeb2bbf7950eb2649ab5e7e087ca25

    • SHA512

      af555643be5885254a6469dcf3735f3556c3d110f3dac4768f3ebde4c060474e8561b0c4e4ff23afbfe885035952c557ef906f932becea6567ec17d079694e36

    • SSDEEP

      3072:sFWfOw5lrGBSXZdPSWStZbD0KHwfhoWH9NgmXUonEnnnnnnnnnnnnnnnnnnnnnnA:sF0NZdqdL0KHSho69NgmWZCOTg7m72Dp

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks