General

  • Target

    bcc61ea176c75f83eb88b8b521a71fba_JaffaCakes118

  • Size

    533KB

  • Sample

    241203-lkn2zavmhp

  • MD5

    bcc61ea176c75f83eb88b8b521a71fba

  • SHA1

    b10496d3ba0b4b3b4a03db062dadabd05066cb9a

  • SHA256

    bbc5a3b9b1e8b247c1fd2608994be2e7259dd4e29166e4c1a13e4ff3da3956d0

  • SHA512

    5c3d4346b0c663404423e826cfb5a2fd34d1789267ac48705a84ff02f5892f0cfbcb2da0342ab097cefb3de4a4cf82fa601cf021f0338f64aa10ea4cb61605b3

  • SSDEEP

    6144:Lrf0vt691/NRsf0dUHBfqTSg9lgFeGRl6wwNzRMt2cXEpQX+SckiAwZ/NdsUpEGO:L4kblESuoaIMthX+ScbZl2GVSJ

Malware Config

Extracted

Family

lokibot

C2

http://tracknaija.com/wp-content/themes/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      bcc61ea176c75f83eb88b8b521a71fba_JaffaCakes118

    • Size

      533KB

    • MD5

      bcc61ea176c75f83eb88b8b521a71fba

    • SHA1

      b10496d3ba0b4b3b4a03db062dadabd05066cb9a

    • SHA256

      bbc5a3b9b1e8b247c1fd2608994be2e7259dd4e29166e4c1a13e4ff3da3956d0

    • SHA512

      5c3d4346b0c663404423e826cfb5a2fd34d1789267ac48705a84ff02f5892f0cfbcb2da0342ab097cefb3de4a4cf82fa601cf021f0338f64aa10ea4cb61605b3

    • SSDEEP

      6144:Lrf0vt691/NRsf0dUHBfqTSg9lgFeGRl6wwNzRMt2cXEpQX+SckiAwZ/NdsUpEGO:L4kblESuoaIMthX+ScbZl2GVSJ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks