General

  • Target

    5ae723426c5c426070363beed4611be0_JaffaCakes118

  • Size

    771KB

  • Sample

    241019-fd1jjaxhmg

  • MD5

    5ae723426c5c426070363beed4611be0

  • SHA1

    78629548aafeaab5a54decad0f5ce79948301509

  • SHA256

    11641171be559d99044f4d62bfbb517de3c0981758f98998a57345b93b01dd1e

  • SHA512

    92ea971aa37388a3d631ea45067d5f7b9a435fa7e278415421584dd9d9df5189ca8c8506c2aa008a8d52c000058b7c661682cd5230d1e8880bf26db60f5a58a3

  • SSDEEP

    12288:x8U/HK7zKpZ22WKFPTM3sXFKbfwupA/MtCpzpRAD9UKi64HchkCLsCZZPy7+7dql:x8LjGTGIuSFp1RAhW6

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/w3WdjHBMG5lDq

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5ae723426c5c426070363beed4611be0_JaffaCakes118

    • Size

      771KB

    • MD5

      5ae723426c5c426070363beed4611be0

    • SHA1

      78629548aafeaab5a54decad0f5ce79948301509

    • SHA256

      11641171be559d99044f4d62bfbb517de3c0981758f98998a57345b93b01dd1e

    • SHA512

      92ea971aa37388a3d631ea45067d5f7b9a435fa7e278415421584dd9d9df5189ca8c8506c2aa008a8d52c000058b7c661682cd5230d1e8880bf26db60f5a58a3

    • SSDEEP

      12288:x8U/HK7zKpZ22WKFPTM3sXFKbfwupA/MtCpzpRAD9UKi64HchkCLsCZZPy7+7dql:x8LjGTGIuSFp1RAhW6

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks