General

  • Target

    fdbcd536c1de437df31a440f35019c03_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241219-ayxqgsypcy

  • MD5

    fdbcd536c1de437df31a440f35019c03

  • SHA1

    6533c338307aa0acaf49a27d6baa011bb413b6b2

  • SHA256

    d24b8170ae01b68882734d975036a482dbf4f941af283ffb433fda5f0f820f49

  • SHA512

    54a02e8c6d1717536f9c2219b7a2e823050cf75ce04812d6372792ee850a443189eb8770d93b68e2a8aaaeacd19fb4c051c183d2ee14d597e25b254db5e336b0

  • SSDEEP

    12288:MKVntWmyUK5kRuwUrvhrbe+y2nv6LUC2xx8T2fX2k/HmUVppUuEVCHo:MKA5OKhvzyiPC+8T2fX2vOQ

Malware Config

Extracted

Family

lokibot

C2

http://manvim.co/fd6/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fdbcd536c1de437df31a440f35019c03_JaffaCakes118

    • Size

      1.3MB

    • MD5

      fdbcd536c1de437df31a440f35019c03

    • SHA1

      6533c338307aa0acaf49a27d6baa011bb413b6b2

    • SHA256

      d24b8170ae01b68882734d975036a482dbf4f941af283ffb433fda5f0f820f49

    • SHA512

      54a02e8c6d1717536f9c2219b7a2e823050cf75ce04812d6372792ee850a443189eb8770d93b68e2a8aaaeacd19fb4c051c183d2ee14d597e25b254db5e336b0

    • SSDEEP

      12288:MKVntWmyUK5kRuwUrvhrbe+y2nv6LUC2xx8T2fX2k/HmUVppUuEVCHo:MKA5OKhvzyiPC+8T2fX2vOQ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks