General

  • Target

    2c859f75249a2c41a9b3d500881792b6_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241009-ha293asglg

  • MD5

    2c859f75249a2c41a9b3d500881792b6

  • SHA1

    1a2f313a6893a38b05735a741742ec5ac1a4cd53

  • SHA256

    03f012835acde40726f5c26651804dd56dbe55061f452b5974c84921e4d65c69

  • SHA512

    1a6f0ab1a4a783210232d5d80721ac28a113c856f2be51f1095ee9ee8affe3e2a9998d0bf43e515b227809953e3793cb85fb73a9b533a094502808dc961e1a83

  • SSDEEP

    12288:XBlM4s5vee1KHT1ReQ+ZxpubJxG7AfHL6Es3Y5kQ6H+Uy1Susr8MmH3jC:Js5vRMHT1ReQ+ZGxOAP4MZZS5R0

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2c859f75249a2c41a9b3d500881792b6_JaffaCakes118

    • Size

      1.4MB

    • MD5

      2c859f75249a2c41a9b3d500881792b6

    • SHA1

      1a2f313a6893a38b05735a741742ec5ac1a4cd53

    • SHA256

      03f012835acde40726f5c26651804dd56dbe55061f452b5974c84921e4d65c69

    • SHA512

      1a6f0ab1a4a783210232d5d80721ac28a113c856f2be51f1095ee9ee8affe3e2a9998d0bf43e515b227809953e3793cb85fb73a9b533a094502808dc961e1a83

    • SSDEEP

      12288:XBlM4s5vee1KHT1ReQ+ZxpubJxG7AfHL6Es3Y5kQ6H+Uy1Susr8MmH3jC:Js5vRMHT1ReQ+ZGxOAP4MZZS5R0

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks