General

  • Target

    b853b3b7b89667048bba5854710e5dd1_JaffaCakes118

  • Size

    730KB

  • Sample

    241202-p9fnnsvja1

  • MD5

    b853b3b7b89667048bba5854710e5dd1

  • SHA1

    7384849ec84849f4ed5f440906ce6f4d641869ba

  • SHA256

    3c096d2e7d6609a3cfd200e0e13a0d077172c243be7a78be004b56e10b2770c4

  • SHA512

    7b98d72ad7843592463326fda86f270369ffa4fba54470737501fe167ec6b1238895b27bc05c535bf72e872ff09aede4158f46ec280b4fd5d56cc16f956f6d61

  • SSDEEP

    12288:Q+1hN/IOPBHMUtR2gpcDEbKWGqTp698OBvhF5GtCtdBdjvVouamysujPk6nVeyhb:QIhN/IOZsUtjpFbKWG0I2Ujd7jeuYsux

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd14/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b853b3b7b89667048bba5854710e5dd1_JaffaCakes118

    • Size

      730KB

    • MD5

      b853b3b7b89667048bba5854710e5dd1

    • SHA1

      7384849ec84849f4ed5f440906ce6f4d641869ba

    • SHA256

      3c096d2e7d6609a3cfd200e0e13a0d077172c243be7a78be004b56e10b2770c4

    • SHA512

      7b98d72ad7843592463326fda86f270369ffa4fba54470737501fe167ec6b1238895b27bc05c535bf72e872ff09aede4158f46ec280b4fd5d56cc16f956f6d61

    • SSDEEP

      12288:Q+1hN/IOPBHMUtR2gpcDEbKWGqTp698OBvhF5GtCtdBdjvVouamysujPk6nVeyhb:QIhN/IOZsUtjpFbKWG0I2Ujd7jeuYsux

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks