Resubmissions

14-12-2024 21:31

241214-1c389awqel 10

General

  • Target

    f0cb70544eb71fd9054d9d475ab44633_JaffaCakes118

  • Size

    227KB

  • Sample

    241214-1c389awqel

  • MD5

    f0cb70544eb71fd9054d9d475ab44633

  • SHA1

    810edb5a89026c9f3d6090dcb07e64e8cafdee50

  • SHA256

    a62490b7606b8b4da18bf697605bcd7f7297cad0b220900e364e1755c0852cd1

  • SHA512

    674c8b13b1fdcc4792ed02358edf2f9472f13692fb9d31f4ecf484426685427b7e1fce3b29e332fdc234e28d8974d6fd5b0de9a993804a7555115a0959702225

  • SSDEEP

    6144:yc1FwB8FXgtD+xC4SwCMSk3fCDPOsoWP04d:y5B8F4NN8S2yO2s4d

Malware Config

Extracted

Family

lokibot

C2

http://everydaywegrind.tk/Office3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f0cb70544eb71fd9054d9d475ab44633_JaffaCakes118

    • Size

      227KB

    • MD5

      f0cb70544eb71fd9054d9d475ab44633

    • SHA1

      810edb5a89026c9f3d6090dcb07e64e8cafdee50

    • SHA256

      a62490b7606b8b4da18bf697605bcd7f7297cad0b220900e364e1755c0852cd1

    • SHA512

      674c8b13b1fdcc4792ed02358edf2f9472f13692fb9d31f4ecf484426685427b7e1fce3b29e332fdc234e28d8974d6fd5b0de9a993804a7555115a0959702225

    • SSDEEP

      6144:yc1FwB8FXgtD+xC4SwCMSk3fCDPOsoWP04d:y5B8F4NN8S2yO2s4d

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks