General

  • Target

    ed2705e3dfedb5d874fd07ad4e94d2af_JaffaCakes118

  • Size

    44KB

  • Sample

    241213-25wkjssnhl

  • MD5

    ed2705e3dfedb5d874fd07ad4e94d2af

  • SHA1

    1694be2aef8be6bf68567c4103eb7ed617cafd3c

  • SHA256

    387ac72f73b8275b1f733db46ee2740f18111942164836250e0885d508841b2d

  • SHA512

    559c54ed93271dc4f8aa1e0ed2fd8484ff91976e2e01358ac6bb480adddc89916fe8fca389d378da18a1915674585fcfe88092e123bf487b3acd55ecc52271fd

  • SSDEEP

    768:fgHgk0YjD9UhmJQVPutmn4klyoEJJt35+Y1/Ag8FlHm9uVPCA6ezKV+Y76L:fI5gm6Zutmn4tf1ntWv3nHr

Malware Config

Extracted

Family

lokibot

C2

http://frembonga.ga/binge/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Banking details for payment.exe

    • Size

      104KB

    • MD5

      1341ed3853e33133e80ba8ce87ebeebc

    • SHA1

      5731e4858eff66a61cb2add852e61293c2ba5331

    • SHA256

      dc0c244674ff2d063c77edd72795ce34db8fe4fdd054ce2a7b5018fb34adba4b

    • SHA512

      d1ea6c3d55d148844e9681fc31a70d4132fd68e2ed1cd59538fdd28765fcbae01d262f61d931671ae8f89c9c9b611136c5aec7aa4bd8d8806afdf235533ea8a6

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks