General

  • Target

    9db4ec03483da8367b05fc6e10bad41d_JaffaCakes118

  • Size

    305KB

  • Sample

    241125-y7j3ra1nan

  • MD5

    9db4ec03483da8367b05fc6e10bad41d

  • SHA1

    871f428fb63978cf99201287310a251f019c852e

  • SHA256

    f9a2568364dba0f3af7c09dbd210228ea27c968beb130d2412636a1710c4aeef

  • SHA512

    e541c4e108c18cd587d29b6a32fa44029030c2c1f748401129c701e9c68aebab0014b4dc51f7c7a10f988614620f6f6bd94974b2afee0e7752653b499a8faa4b

  • SSDEEP

    6144:wkbkZIphtxJLAA3y0/TP/CcenAl8AWYZIgYnpFZWpf4zhUrzYLTN:/kZUxhAayqTP6ceAcXgCpLWpwzWgt

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.18/dsaicosaicasdi.php/BEF2P6YRqV1nZ

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      9db4ec03483da8367b05fc6e10bad41d_JaffaCakes118

    • Size

      305KB

    • MD5

      9db4ec03483da8367b05fc6e10bad41d

    • SHA1

      871f428fb63978cf99201287310a251f019c852e

    • SHA256

      f9a2568364dba0f3af7c09dbd210228ea27c968beb130d2412636a1710c4aeef

    • SHA512

      e541c4e108c18cd587d29b6a32fa44029030c2c1f748401129c701e9c68aebab0014b4dc51f7c7a10f988614620f6f6bd94974b2afee0e7752653b499a8faa4b

    • SSDEEP

      6144:wkbkZIphtxJLAA3y0/TP/CcenAl8AWYZIgYnpFZWpf4zhUrzYLTN:/kZUxhAayqTP6ceAcXgCpLWpwzWgt

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks