General

  • Target

    30df8724718778ec0589b833c8a6c9c0_JaffaCakes118

  • Size

    727KB

  • Sample

    241010-t4mbgs1bkl

  • MD5

    30df8724718778ec0589b833c8a6c9c0

  • SHA1

    4eb7025fc71a2ef2f9e2b73ce28f9eb9b7f6f4a7

  • SHA256

    2ae1d4a010484f785fe45e1aca43bfd133e76f664ce85e3cd16d1518c8006013

  • SHA512

    51daaf597be19ffdebdda995b5329cc7b1a8ef57114ff1ecff4d4110c77a08d16eb723968e938f1fa4b65a587bb4dd0283f9b71e4d5ecf806104be43d760cb3b

  • SSDEEP

    12288:dwL9PjqLbOvH+HJYpQQ2uyaCBpvm+IPq56YGw/fTb0Vd5tSLKQrCgxBDoC4YK3:dwLpqPOvHWkQQ2uyaCHmPP9YGw/fTb0/

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd6/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      30df8724718778ec0589b833c8a6c9c0_JaffaCakes118

    • Size

      727KB

    • MD5

      30df8724718778ec0589b833c8a6c9c0

    • SHA1

      4eb7025fc71a2ef2f9e2b73ce28f9eb9b7f6f4a7

    • SHA256

      2ae1d4a010484f785fe45e1aca43bfd133e76f664ce85e3cd16d1518c8006013

    • SHA512

      51daaf597be19ffdebdda995b5329cc7b1a8ef57114ff1ecff4d4110c77a08d16eb723968e938f1fa4b65a587bb4dd0283f9b71e4d5ecf806104be43d760cb3b

    • SSDEEP

      12288:dwL9PjqLbOvH+HJYpQQ2uyaCBpvm+IPq56YGw/fTb0Vd5tSLKQrCgxBDoC4YK3:dwLpqPOvHWkQQ2uyaCHmPP9YGw/fTb0/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks