General

  • Target

    d2c6db66473c76df5fc40af64eb4abdd_JaffaCakes118

  • Size

    229KB

  • Sample

    241207-q7ffkatqdy

  • MD5

    d2c6db66473c76df5fc40af64eb4abdd

  • SHA1

    915938e4d1d7e16f1cc92c9b4977ed1f0d5cf31a

  • SHA256

    ae3ba262ffc14ea78944dee9331e9336f508b0b283481262ab2ee81b90023bd1

  • SHA512

    f845402ecf3ce21c750855cd8cafc367c285dd89664965143215433c0c9e101d62be714a2f20a1ed43220a21c01268bdb86ceace9d86f3926b73e3161d89d31f

  • SSDEEP

    6144:FiXB6Sxquc2iIxvAZgqOWzZBaivEup/t3Z9x6p3:FIfqUhsvuilRZ9xq3

Malware Config

Extracted

Family

lokibot

C2

http://185.227.139.5/sxisodifntose.php/BEF2P6YRqV1nZ

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d2c6db66473c76df5fc40af64eb4abdd_JaffaCakes118

    • Size

      229KB

    • MD5

      d2c6db66473c76df5fc40af64eb4abdd

    • SHA1

      915938e4d1d7e16f1cc92c9b4977ed1f0d5cf31a

    • SHA256

      ae3ba262ffc14ea78944dee9331e9336f508b0b283481262ab2ee81b90023bd1

    • SHA512

      f845402ecf3ce21c750855cd8cafc367c285dd89664965143215433c0c9e101d62be714a2f20a1ed43220a21c01268bdb86ceace9d86f3926b73e3161d89d31f

    • SSDEEP

      6144:FiXB6Sxquc2iIxvAZgqOWzZBaivEup/t3Z9x6p3:FIfqUhsvuilRZ9xq3

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks