General

  • Target

    add314817d2ba5280c227f548c4ae715_JaffaCakes118

  • Size

    729KB

  • Sample

    241128-2ttltatmgt

  • MD5

    add314817d2ba5280c227f548c4ae715

  • SHA1

    4e5e581c537ce0de0ccee75f8e0d173db30f2df4

  • SHA256

    eab4efd7bc1f23a02e79b46224ca494813bdbb2e8ffd73c4417fa57493fb294d

  • SHA512

    5763e94e5175710b52f69afac318b8f51a23b127a87bba43f884f903c9aeda911fc81f7733637b900e462f015b8bcf5b28f5b00ea4430f6dd3cfb6b35a406e67

  • SSDEEP

    12288:BUO/m/79WECjNC7AEXTHxZBCt8YCOhXRvQoqXfRZzMI77/TXAjySHHObdbatVehb:mUX07lLBCtvCIRvQoq3H4

Malware Config

Extracted

Family

lokibot

C2

http://192.236.162.234/oga/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      add314817d2ba5280c227f548c4ae715_JaffaCakes118

    • Size

      729KB

    • MD5

      add314817d2ba5280c227f548c4ae715

    • SHA1

      4e5e581c537ce0de0ccee75f8e0d173db30f2df4

    • SHA256

      eab4efd7bc1f23a02e79b46224ca494813bdbb2e8ffd73c4417fa57493fb294d

    • SHA512

      5763e94e5175710b52f69afac318b8f51a23b127a87bba43f884f903c9aeda911fc81f7733637b900e462f015b8bcf5b28f5b00ea4430f6dd3cfb6b35a406e67

    • SSDEEP

      12288:BUO/m/79WECjNC7AEXTHxZBCt8YCOhXRvQoqXfRZzMI77/TXAjySHHObdbatVehb:mUX07lLBCtvCIRvQoq3H4

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks