General

  • Target

    80ee353884779a0484a8c2f1a4d09e10_JaffaCakes118

  • Size

    648KB

  • Sample

    241031-bbrfmawblr

  • MD5

    80ee353884779a0484a8c2f1a4d09e10

  • SHA1

    9f06127986e611efcf022a398a1db02497cd1f86

  • SHA256

    3eee35e2da8d727156e4ac74426f9ee320051fe209ddeb50c9f47119d07365d0

  • SHA512

    154aa8b85ba8cbd9801e68a044532ef88201d59b4c681d8ec223558663b53b3cf718b14f0621f0b758e1cadd6f040215c2ca68270b21a6b319e177aafa49bfe4

  • SSDEEP

    12288:/L37lQ33skuuXuwdFPTXReg6hdfH4eiV1cQGJ53Q:eLI1hdgeiV17GXQ

Malware Config

Extracted

Family

lokibot

C2

http://ctp1.xyz/w2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      80ee353884779a0484a8c2f1a4d09e10_JaffaCakes118

    • Size

      648KB

    • MD5

      80ee353884779a0484a8c2f1a4d09e10

    • SHA1

      9f06127986e611efcf022a398a1db02497cd1f86

    • SHA256

      3eee35e2da8d727156e4ac74426f9ee320051fe209ddeb50c9f47119d07365d0

    • SHA512

      154aa8b85ba8cbd9801e68a044532ef88201d59b4c681d8ec223558663b53b3cf718b14f0621f0b758e1cadd6f040215c2ca68270b21a6b319e177aafa49bfe4

    • SSDEEP

      12288:/L37lQ33skuuXuwdFPTXReg6hdfH4eiV1cQGJ53Q:eLI1hdgeiV17GXQ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks