General

  • Target

    cd38c2cca614bcb2eb9b46e3ff71f7cd_JaffaCakes118

  • Size

    767KB

  • Sample

    241206-qmblwayrgz

  • MD5

    cd38c2cca614bcb2eb9b46e3ff71f7cd

  • SHA1

    f1331da710e8113c5bf156175e70d8673e4f42d5

  • SHA256

    9cfcfd5f81ea95875ce4438ed4f4d8fcc58de169a4acec36af3005b9fd3614cf

  • SHA512

    8247ff889877ea003b2827f615e42665d38577495cdde058a8910c9b25c8c721c2f836762206cb322479bb4cf18b0b0eb3358a9b7d10ec85b25898d0d4e69e30

  • SSDEEP

    12288:wlWDO/HK7zKNdEVg/fcrMeikoFpHtf9Qm5gIinF9Ddp1DmXzfomR20EidO1xMn1w:DDJaEVg/fcrekoFBVamWIinF9DdpOzf2

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      cd38c2cca614bcb2eb9b46e3ff71f7cd_JaffaCakes118

    • Size

      767KB

    • MD5

      cd38c2cca614bcb2eb9b46e3ff71f7cd

    • SHA1

      f1331da710e8113c5bf156175e70d8673e4f42d5

    • SHA256

      9cfcfd5f81ea95875ce4438ed4f4d8fcc58de169a4acec36af3005b9fd3614cf

    • SHA512

      8247ff889877ea003b2827f615e42665d38577495cdde058a8910c9b25c8c721c2f836762206cb322479bb4cf18b0b0eb3358a9b7d10ec85b25898d0d4e69e30

    • SSDEEP

      12288:wlWDO/HK7zKNdEVg/fcrMeikoFpHtf9Qm5gIinF9Ddp1DmXzfomR20EidO1xMn1w:DDJaEVg/fcrekoFBVamWIinF9DdpOzf2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks