General

  • Target

    63daf591a4338cdf51c53fc63b2a66e4_JaffaCakes118

  • Size

    747KB

  • Sample

    241020-xvgw7axbkk

  • MD5

    63daf591a4338cdf51c53fc63b2a66e4

  • SHA1

    e9c8d30554f84827229461c5e54a1c3e0c0c7f22

  • SHA256

    1cf9b819c1ad4771f76ba564223d010bd1eff0f396810dd48b1e3df4eeedca50

  • SHA512

    f04955f654c354ddeb4dbb339cf32c623c8f4d040272a03097248945891d1c766d9aa697ea49eeece023f0684d1411299b7fcf7513459ecb1134933e58ae100f

  • SSDEEP

    12288:9LPxKAbILqltsXqtB2/p+TFKpaca5CCh0MCRbYVKNV4pH5DBoFLsZwI7PBqygAHp:9LwAbI+wXqtB2/kQacECC+pRQ7pZDBoU

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd16/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      63daf591a4338cdf51c53fc63b2a66e4_JaffaCakes118

    • Size

      747KB

    • MD5

      63daf591a4338cdf51c53fc63b2a66e4

    • SHA1

      e9c8d30554f84827229461c5e54a1c3e0c0c7f22

    • SHA256

      1cf9b819c1ad4771f76ba564223d010bd1eff0f396810dd48b1e3df4eeedca50

    • SHA512

      f04955f654c354ddeb4dbb339cf32c623c8f4d040272a03097248945891d1c766d9aa697ea49eeece023f0684d1411299b7fcf7513459ecb1134933e58ae100f

    • SSDEEP

      12288:9LPxKAbILqltsXqtB2/p+TFKpaca5CCh0MCRbYVKNV4pH5DBoFLsZwI7PBqygAHp:9LwAbI+wXqtB2/kQacECC+pRQ7pZDBoU

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks