General

  • Target

    77e6678e0b0de0f8c2cc6b0d65ee5de2_JaffaCakes118

  • Size

    296KB

  • Sample

    241028-f3w8eayqeq

  • MD5

    77e6678e0b0de0f8c2cc6b0d65ee5de2

  • SHA1

    4dee777adb8bc96ba4d2f85f626d966f9ac0cef5

  • SHA256

    995bffd2446e01cf7817573adfc1ecf40679b37ffce1640969352ddca313c346

  • SHA512

    cea4a3a771f6b162ea50ee76a28de79d286b7f37aef2e5e3322fc0e9549bfc6587745f7055b753a6ffa8d8189881b5b35377e523cb66c3267f000f7062a4c460

  • SSDEEP

    6144:ViTRiOnJgC7IUPXXqr9kTmiscgC2wk92FKP/VbxAJjPh:ViTRLJzarZ00/VbWJ9

Malware Config

Extracted

Family

lokibot

C2

http://everydaywegrind.gq/Office5/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      77e6678e0b0de0f8c2cc6b0d65ee5de2_JaffaCakes118

    • Size

      296KB

    • MD5

      77e6678e0b0de0f8c2cc6b0d65ee5de2

    • SHA1

      4dee777adb8bc96ba4d2f85f626d966f9ac0cef5

    • SHA256

      995bffd2446e01cf7817573adfc1ecf40679b37ffce1640969352ddca313c346

    • SHA512

      cea4a3a771f6b162ea50ee76a28de79d286b7f37aef2e5e3322fc0e9549bfc6587745f7055b753a6ffa8d8189881b5b35377e523cb66c3267f000f7062a4c460

    • SSDEEP

      6144:ViTRiOnJgC7IUPXXqr9kTmiscgC2wk92FKP/VbxAJjPh:ViTRLJzarZ00/VbWJ9

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks