General

  • Target

    b34575c36f5e24cd748b8cac361f7009_JaffaCakes118

  • Size

    742KB

  • Sample

    241129-ynn8csxqbk

  • MD5

    b34575c36f5e24cd748b8cac361f7009

  • SHA1

    6a6c94a5ce7f0ace6e10a1f591a94bbdfdbfbe5e

  • SHA256

    58570a2d86cdc9193c235b2685e9dca6b6e3dd2215b0c66e3ea1bcbeca36c298

  • SHA512

    48985d99adf8dd79317d8163f07ac2c509a4e61bf439a6589defc479b2523f9055ad6c9c0a3b99a58c819ab497d604997861a17c5691e1194cd70fe5c23372f4

  • SSDEEP

    12288:I6Cv9//HK7zYK8t54h+lmY3RUFfdmT6Mnjx7lwQr7SKmT1aNOUX3YY4ufQkeB/R3:IlckGLYBUBdo6qxppS5s

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b34575c36f5e24cd748b8cac361f7009_JaffaCakes118

    • Size

      742KB

    • MD5

      b34575c36f5e24cd748b8cac361f7009

    • SHA1

      6a6c94a5ce7f0ace6e10a1f591a94bbdfdbfbe5e

    • SHA256

      58570a2d86cdc9193c235b2685e9dca6b6e3dd2215b0c66e3ea1bcbeca36c298

    • SHA512

      48985d99adf8dd79317d8163f07ac2c509a4e61bf439a6589defc479b2523f9055ad6c9c0a3b99a58c819ab497d604997861a17c5691e1194cd70fe5c23372f4

    • SSDEEP

      12288:I6Cv9//HK7zYK8t54h+lmY3RUFfdmT6Mnjx7lwQr7SKmT1aNOUX3YY4ufQkeB/R3:IlckGLYBUBdo6qxppS5s

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks