General

  • Target

    8a8f6c7b9c8cee57d97b599be719bece_JaffaCakes118

  • Size

    227KB

  • Sample

    241103-kjayaazdqh

  • MD5

    8a8f6c7b9c8cee57d97b599be719bece

  • SHA1

    6c1563076361e6af0775e39b1138983d3057b4e5

  • SHA256

    f6f185cf7c6591797f9df660caf11d8b0485d907ca46a8fdb9b1e31577f2be3e

  • SHA512

    2681c8ab605c1ab0fce1e0ea0e4172b3a560ee1bcc2278506852d7aa39ce45d857a1fc5864cfb9bf1c0daf9d312fb10efaa4720ced1bd8fddac79619dfbf3bbe

  • SSDEEP

    6144:+kYF5T9Uho+dn2qOxjjNb+IcyyVZizBssWkIqtOM0HjWn:85TqLd2q8UIaZi1L/UpDWn

Malware Config

Extracted

Family

lokibot

C2

http://everydaywegrind.tk/Office3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8a8f6c7b9c8cee57d97b599be719bece_JaffaCakes118

    • Size

      227KB

    • MD5

      8a8f6c7b9c8cee57d97b599be719bece

    • SHA1

      6c1563076361e6af0775e39b1138983d3057b4e5

    • SHA256

      f6f185cf7c6591797f9df660caf11d8b0485d907ca46a8fdb9b1e31577f2be3e

    • SHA512

      2681c8ab605c1ab0fce1e0ea0e4172b3a560ee1bcc2278506852d7aa39ce45d857a1fc5864cfb9bf1c0daf9d312fb10efaa4720ced1bd8fddac79619dfbf3bbe

    • SSDEEP

      6144:+kYF5T9Uho+dn2qOxjjNb+IcyyVZizBssWkIqtOM0HjWn:85TqLd2q8UIaZi1L/UpDWn

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks