General

  • Target

    207645f63810cee7e11916c7e0a67b36_JaffaCakes118

  • Size

    815KB

  • Sample

    241008-jxan1azgmg

  • MD5

    207645f63810cee7e11916c7e0a67b36

  • SHA1

    75df97feffc4ef507f9adc09a0ebb334d5639083

  • SHA256

    690f29000238ee3c6064f73e7ecb923128c2e305067fcccc0f444012ca8b6c13

  • SHA512

    ac5276776e40c8c2c40829a3e561d5bea5ae8ee248b7cbc88e1fcfdda2e79675703ecff08efa64f95e11a14a3a1203f76fa7273d540ecc9e80e93d278666e1d6

  • SSDEEP

    12288:cyxC/JMM5dcaBuzCPHK7zLIqUnAQFo9YdcXUxmnsL0XXYA2w4fEDkrwwSdw95:cyYBMGcd54qjOoYEU4ns2IAOMFz

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/ADdkqqfZahlYB

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      207645f63810cee7e11916c7e0a67b36_JaffaCakes118

    • Size

      815KB

    • MD5

      207645f63810cee7e11916c7e0a67b36

    • SHA1

      75df97feffc4ef507f9adc09a0ebb334d5639083

    • SHA256

      690f29000238ee3c6064f73e7ecb923128c2e305067fcccc0f444012ca8b6c13

    • SHA512

      ac5276776e40c8c2c40829a3e561d5bea5ae8ee248b7cbc88e1fcfdda2e79675703ecff08efa64f95e11a14a3a1203f76fa7273d540ecc9e80e93d278666e1d6

    • SSDEEP

      12288:cyxC/JMM5dcaBuzCPHK7zLIqUnAQFo9YdcXUxmnsL0XXYA2w4fEDkrwwSdw95:cyYBMGcd54qjOoYEU4ns2IAOMFz

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks