General

  • Target

    42237eade180828396a13d68e585c56c_JaffaCakes118

  • Size

    298KB

  • Sample

    241013-z74mtstcrp

  • MD5

    42237eade180828396a13d68e585c56c

  • SHA1

    f2b420612b7493bc20c4257878d02c49f9b4e120

  • SHA256

    2c1ff9c244578d01ce47a2c7b1acd2bd5d53ff8e2af75209def7e0f05f23477a

  • SHA512

    f4cefd1400d708cde630a0ac4b73d62d47706949535bb4cc1da07a01e85ffd3fa2366ed82b6115e0b0e66cf658db73ee61b4f239c5fbb318be66ac29f51b8d5f

  • SSDEEP

    6144:WBUJIphOiCoT8DereESphfxw+1WczWrg82:SUJBDcE5w+1qs82

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.18/dsaicosaicasdi.php/4jmQmvXLmQyTH

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      42237eade180828396a13d68e585c56c_JaffaCakes118

    • Size

      298KB

    • MD5

      42237eade180828396a13d68e585c56c

    • SHA1

      f2b420612b7493bc20c4257878d02c49f9b4e120

    • SHA256

      2c1ff9c244578d01ce47a2c7b1acd2bd5d53ff8e2af75209def7e0f05f23477a

    • SHA512

      f4cefd1400d708cde630a0ac4b73d62d47706949535bb4cc1da07a01e85ffd3fa2366ed82b6115e0b0e66cf658db73ee61b4f239c5fbb318be66ac29f51b8d5f

    • SSDEEP

      6144:WBUJIphOiCoT8DereESphfxw+1WczWrg82:SUJBDcE5w+1qs82

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks