General

  • Target

    5dbfd500f98a28d527950420f2bde135_JaffaCakes118

  • Size

    788KB

  • Sample

    241019-vvmfkazdjm

  • MD5

    5dbfd500f98a28d527950420f2bde135

  • SHA1

    80c7df984adc7d0fb2ce65bf6b8e847f245b4353

  • SHA256

    6ea3495ab20874a311fdfdd8dc61b4968b8b165fc7a403e3a3ae099e5985a781

  • SHA512

    c31371a49c4fe270b0a689cef9a8d72992670860abac1fc4addceb4527c09f19ef565d34688e77eb373ef0a4ddd5f90f8ce3324eba7864b9e37cbeaf0dfa8e6f

  • SSDEEP

    12288:BzGrmvFq+pvTg+HK7zYr/TyE8T+2vLdAc0fs6FcSkrIKdLYjCemms2S:BUmZg1Url8TDv5ugEcLY9b

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd14/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5dbfd500f98a28d527950420f2bde135_JaffaCakes118

    • Size

      788KB

    • MD5

      5dbfd500f98a28d527950420f2bde135

    • SHA1

      80c7df984adc7d0fb2ce65bf6b8e847f245b4353

    • SHA256

      6ea3495ab20874a311fdfdd8dc61b4968b8b165fc7a403e3a3ae099e5985a781

    • SHA512

      c31371a49c4fe270b0a689cef9a8d72992670860abac1fc4addceb4527c09f19ef565d34688e77eb373ef0a4ddd5f90f8ce3324eba7864b9e37cbeaf0dfa8e6f

    • SSDEEP

      12288:BzGrmvFq+pvTg+HK7zYr/TyE8T+2vLdAc0fs6FcSkrIKdLYjCemms2S:BUmZg1Url8TDv5ugEcLY9b

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks