General

  • Target

    1f89a7f4a8d55d4c759222ac356430f1_JaffaCakes118

  • Size

    228KB

  • Sample

    241008-exg1vssdqh

  • MD5

    1f89a7f4a8d55d4c759222ac356430f1

  • SHA1

    c13167da1383354486173964bc6a3ebe971332cd

  • SHA256

    244e6ac8c5da099a4d6d7c6f6ea2f7b7a146311f1b38b5d9c609d575a3597a93

  • SHA512

    540b9682e844b5ca144b976ed85e5bb92ffde1b2e18caff8d157ea5d2a8f492cae4dcb1f59cbf89e86af1a8f77313225f7260ea9c3bb42b49c86b0ae738238a7

  • SSDEEP

    6144:qkiCtr/tsEk7nZfAL+UGGoR5ijRfWQPTQ7Mfm22W:ql2/tVCnZA6koRMtfZPTW2P

Malware Config

Extracted

Family

lokibot

C2

http://everydaywegrind.ga/BN22/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      1f89a7f4a8d55d4c759222ac356430f1_JaffaCakes118

    • Size

      228KB

    • MD5

      1f89a7f4a8d55d4c759222ac356430f1

    • SHA1

      c13167da1383354486173964bc6a3ebe971332cd

    • SHA256

      244e6ac8c5da099a4d6d7c6f6ea2f7b7a146311f1b38b5d9c609d575a3597a93

    • SHA512

      540b9682e844b5ca144b976ed85e5bb92ffde1b2e18caff8d157ea5d2a8f492cae4dcb1f59cbf89e86af1a8f77313225f7260ea9c3bb42b49c86b0ae738238a7

    • SSDEEP

      6144:qkiCtr/tsEk7nZfAL+UGGoR5ijRfWQPTQ7Mfm22W:ql2/tVCnZA6koRMtfZPTW2P

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks