General

  • Target

    5485bba218c4e8626dfa1b7721b04f6e_JaffaCakes118

  • Size

    617KB

  • Sample

    241018-a1d16ayejr

  • MD5

    5485bba218c4e8626dfa1b7721b04f6e

  • SHA1

    1be0fa558f1b25af8bce18c5b08baf45de4677ff

  • SHA256

    0d2b50c2c7dc2ee40d9d78c782f96f7215f2bb4d7e693bf908019c8776e3e3aa

  • SHA512

    5327142225908fa92ce706c677fe0baac7baf1b36dc448d2aed96714c3a15cd6a4915303cfcf14205b3e27058123cb348cffe3025ccf9085b80e200d63e30162

  • SSDEEP

    12288:x0h/rbQ+X8+UiDLbRHahMUiUDEprVubzgTY4ig:x0h/rbQ+X8+UiDLbRHahMUtERVubUTYU

Malware Config

Extracted

Family

lokibot

C2

http://checkvim.com/fd3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5485bba218c4e8626dfa1b7721b04f6e_JaffaCakes118

    • Size

      617KB

    • MD5

      5485bba218c4e8626dfa1b7721b04f6e

    • SHA1

      1be0fa558f1b25af8bce18c5b08baf45de4677ff

    • SHA256

      0d2b50c2c7dc2ee40d9d78c782f96f7215f2bb4d7e693bf908019c8776e3e3aa

    • SHA512

      5327142225908fa92ce706c677fe0baac7baf1b36dc448d2aed96714c3a15cd6a4915303cfcf14205b3e27058123cb348cffe3025ccf9085b80e200d63e30162

    • SSDEEP

      12288:x0h/rbQ+X8+UiDLbRHahMUiUDEprVubzgTY4ig:x0h/rbQ+X8+UiDLbRHahMUtERVubUTYU

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks