General

  • Target

    67039f6aff636fb8e1cf386f9e0b2e96_JaffaCakes118

  • Size

    850KB

  • Sample

    241021-rymc7axemc

  • MD5

    67039f6aff636fb8e1cf386f9e0b2e96

  • SHA1

    0bfe0be4a797125d6478f60f36616a9114c99383

  • SHA256

    f3d4a0ea5e42ea3617fc8fc01bb61ed71fc15bab20b3936bb1c6db0782a98eab

  • SHA512

    7534692b7082707bb63855193004107fc6757855c52495da71e078c47bbe4f75be7ff125040eab5ee1847a7ee007838f90f29a57c0ae31b322968b627f68bb6e

  • SSDEEP

    24576:0+MedYvL/OeTJ5MbNMm4r/Y907GyKboY:5Me2TDamm4rA9/p0Y

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.18/dsaicosaicasdi.php/jRbn3g7uWVTsx

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      67039f6aff636fb8e1cf386f9e0b2e96_JaffaCakes118

    • Size

      850KB

    • MD5

      67039f6aff636fb8e1cf386f9e0b2e96

    • SHA1

      0bfe0be4a797125d6478f60f36616a9114c99383

    • SHA256

      f3d4a0ea5e42ea3617fc8fc01bb61ed71fc15bab20b3936bb1c6db0782a98eab

    • SHA512

      7534692b7082707bb63855193004107fc6757855c52495da71e078c47bbe4f75be7ff125040eab5ee1847a7ee007838f90f29a57c0ae31b322968b627f68bb6e

    • SSDEEP

      24576:0+MedYvL/OeTJ5MbNMm4r/Y907GyKboY:5Me2TDamm4rA9/p0Y

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks