General

  • Target

    2e3ab8566dc44d81f090c2d5cdfd3d55_JaffaCakes118

  • Size

    834KB

  • Sample

    241009-ktcjvsvgne

  • MD5

    2e3ab8566dc44d81f090c2d5cdfd3d55

  • SHA1

    e7e63845a9bb3f4612bc0a82d2441088cd578db7

  • SHA256

    975e528fa387d5670e6ca67a94f9b8d421d788efc325ce4d9324a33c682d083d

  • SHA512

    6febe1ac07cb8b778ef11e034b43f76bdce1e9a1c4838a500b02a818b264ee4e282a569ac27a70df04881557387691f79631a84eca4b01f52631b53ee3ae21bd

  • SSDEEP

    24576:DNQHMWcf+i4N92CfIc0pwjzjpo1LKboH:5Q/cf+/Bf8Y1O+0H

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/gb0kpVY5AUPrv

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2e3ab8566dc44d81f090c2d5cdfd3d55_JaffaCakes118

    • Size

      834KB

    • MD5

      2e3ab8566dc44d81f090c2d5cdfd3d55

    • SHA1

      e7e63845a9bb3f4612bc0a82d2441088cd578db7

    • SHA256

      975e528fa387d5670e6ca67a94f9b8d421d788efc325ce4d9324a33c682d083d

    • SHA512

      6febe1ac07cb8b778ef11e034b43f76bdce1e9a1c4838a500b02a818b264ee4e282a569ac27a70df04881557387691f79631a84eca4b01f52631b53ee3ae21bd

    • SSDEEP

      24576:DNQHMWcf+i4N92CfIc0pwjzjpo1LKboH:5Q/cf+/Bf8Y1O+0H

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks