General

  • Target

    c8976aa01fb39b742a75daa84b974f38_JaffaCakes118

  • Size

    1.0MB

  • Sample

    241205-t9sqfsyqgl

  • MD5

    c8976aa01fb39b742a75daa84b974f38

  • SHA1

    c4d465f3bd01e7d9d62031dcb9062fd090a3304d

  • SHA256

    a491adea93cfa47734c9807e9f58143e40b9697b005b23575f91cca7e7a93103

  • SHA512

    6190b365c98ddca2a8320dfaede0ff3afb0727ccb4ab486d8ed9ef5e9554269316c77bac5a66c587e33f480bb8a8ca58cbaaa0d4f05015949fe4de23a52098be

  • SSDEEP

    12288:+wwGtL4ZzfgjhVz9SY4FNAnssnh8/OpE/XVFmGjaFBk:RwGtLKsVRPBh8F/

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/w3WdjHBMG5lDq

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c8976aa01fb39b742a75daa84b974f38_JaffaCakes118

    • Size

      1.0MB

    • MD5

      c8976aa01fb39b742a75daa84b974f38

    • SHA1

      c4d465f3bd01e7d9d62031dcb9062fd090a3304d

    • SHA256

      a491adea93cfa47734c9807e9f58143e40b9697b005b23575f91cca7e7a93103

    • SHA512

      6190b365c98ddca2a8320dfaede0ff3afb0727ccb4ab486d8ed9ef5e9554269316c77bac5a66c587e33f480bb8a8ca58cbaaa0d4f05015949fe4de23a52098be

    • SSDEEP

      12288:+wwGtL4ZzfgjhVz9SY4FNAnssnh8/OpE/XVFmGjaFBk:RwGtLKsVRPBh8F/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks