General

  • Target

    6a581bdf97799e4336eac6d87b06c265_JaffaCakes118

  • Size

    1.0MB

  • Sample

    241022-nysy7avhkp

  • MD5

    6a581bdf97799e4336eac6d87b06c265

  • SHA1

    c2644a1e4dfe18cc8e79a9130288b7f446066547

  • SHA256

    828c0d9230c8905debb1d923ed9cb65e1c503af272d52dcc7658050f345f6005

  • SHA512

    5250f90f9a458bd258c478099191768d4c9a7a59442954618f2b924b8232a786eaff2eb1e6c21eecb04011e23db689952e87ea52169d3526d7ff05558773b174

  • SSDEEP

    12288:O4If2jhh9q+HF+gu4yIZtO/uvFRe+QLwHsjGNESuxTlkyfYbRdJjwYp:O4vNhn/5tO/6FM+QMHd

Malware Config

Extracted

Family

lokibot

C2

http://silimac.xyz/rfd/ty/lo.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6a581bdf97799e4336eac6d87b06c265_JaffaCakes118

    • Size

      1.0MB

    • MD5

      6a581bdf97799e4336eac6d87b06c265

    • SHA1

      c2644a1e4dfe18cc8e79a9130288b7f446066547

    • SHA256

      828c0d9230c8905debb1d923ed9cb65e1c503af272d52dcc7658050f345f6005

    • SHA512

      5250f90f9a458bd258c478099191768d4c9a7a59442954618f2b924b8232a786eaff2eb1e6c21eecb04011e23db689952e87ea52169d3526d7ff05558773b174

    • SSDEEP

      12288:O4If2jhh9q+HF+gu4yIZtO/uvFRe+QLwHsjGNESuxTlkyfYbRdJjwYp:O4vNhn/5tO/6FM+QMHd

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks