General

  • Target

    306eef8d16da0ab15cbf68342dada745_JaffaCakes118

  • Size

    245KB

  • Sample

    241010-r6948awfnn

  • MD5

    306eef8d16da0ab15cbf68342dada745

  • SHA1

    b52313e7c7520a438a569b572afa577ffe98df55

  • SHA256

    8a81fa90becb572cf56f979346d32793a9864d8463e1eb7bc28616896d96151f

  • SHA512

    9700c91187a506438fb7e85dd8a1e945491c9eedac2942017d3e6b309856e4e1eed24264cabec018a6dc80c060e44217614737bfd9d92b738f08fdf1dbe986b4

  • SSDEEP

    6144:DW5dvbAnia3s+u9ZjqG619Z6JOHvncCF1NqfiQ:YvbAniEs77y8JOHvncCF1Nq/

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/E3YgTC7JjswjV

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      306eef8d16da0ab15cbf68342dada745_JaffaCakes118

    • Size

      245KB

    • MD5

      306eef8d16da0ab15cbf68342dada745

    • SHA1

      b52313e7c7520a438a569b572afa577ffe98df55

    • SHA256

      8a81fa90becb572cf56f979346d32793a9864d8463e1eb7bc28616896d96151f

    • SHA512

      9700c91187a506438fb7e85dd8a1e945491c9eedac2942017d3e6b309856e4e1eed24264cabec018a6dc80c060e44217614737bfd9d92b738f08fdf1dbe986b4

    • SSDEEP

      6144:DW5dvbAnia3s+u9ZjqG619Z6JOHvncCF1NqfiQ:YvbAniEs77y8JOHvncCF1Nq/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks