General

  • Target

    a6ddea61a510a4df6968fcfc929150a4_JaffaCakes118

  • Size

    931KB

  • Sample

    241127-kadmtavres

  • MD5

    a6ddea61a510a4df6968fcfc929150a4

  • SHA1

    4d87c30266b1eb6b3ddeae8d0150fdb7137eea2f

  • SHA256

    eeccf9d06c765c7ffe33f78aaaf745b1eab8bae635cc87fc4c1b87f02b66dc22

  • SHA512

    1b02e010ec3b8ad8c54e94bc927f1cc7363b36af5f84ff0f1fe9f030f4ed162f4d22813c4f9b1acc70298e64d70ed87acf9931058964f654b3ebdc59deff6cbf

  • SSDEEP

    12288:tfqAaZC818hkBauGIg9LBqvRaGvQKRTfZXjAoD:tDaput9LYz3RTfZca

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a6ddea61a510a4df6968fcfc929150a4_JaffaCakes118

    • Size

      931KB

    • MD5

      a6ddea61a510a4df6968fcfc929150a4

    • SHA1

      4d87c30266b1eb6b3ddeae8d0150fdb7137eea2f

    • SHA256

      eeccf9d06c765c7ffe33f78aaaf745b1eab8bae635cc87fc4c1b87f02b66dc22

    • SHA512

      1b02e010ec3b8ad8c54e94bc927f1cc7363b36af5f84ff0f1fe9f030f4ed162f4d22813c4f9b1acc70298e64d70ed87acf9931058964f654b3ebdc59deff6cbf

    • SSDEEP

      12288:tfqAaZC818hkBauGIg9LBqvRaGvQKRTfZXjAoD:tDaput9LYz3RTfZca

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks