General

  • Target

    JaffaCakes118_03c4801d0dc21f4d6f0ba7df857844f9

  • Size

    369KB

  • Sample

    241231-elr2pawphz

  • MD5

    03c4801d0dc21f4d6f0ba7df857844f9

  • SHA1

    1f45ccc862fd96d7f205f0ce8860535768e20a70

  • SHA256

    08534277cbfb86840d5250f0a0672ac1fa61a3173cdbccaa2f14e0b9707527aa

  • SHA512

    fd5016c0b1a5cd0c58a0a6fa060aaed4808499280075ade2dc8de4c53ecd3c2aeb92bc51a58b7679bd33e0ef8c9eef72b86f0551644fad579b02062806b7ff9c

  • SSDEEP

    6144:Q6Uqd2GhNNK9bCUB3/bKltyu5/uHFL17unUoJBltTXL:xUi2iNE9bCUBvbOtyu5/uTPoJZ

Malware Config

Extracted

Family

lokibot

C2

http://bobbyelectronics.xyz/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_03c4801d0dc21f4d6f0ba7df857844f9

    • Size

      369KB

    • MD5

      03c4801d0dc21f4d6f0ba7df857844f9

    • SHA1

      1f45ccc862fd96d7f205f0ce8860535768e20a70

    • SHA256

      08534277cbfb86840d5250f0a0672ac1fa61a3173cdbccaa2f14e0b9707527aa

    • SHA512

      fd5016c0b1a5cd0c58a0a6fa060aaed4808499280075ade2dc8de4c53ecd3c2aeb92bc51a58b7679bd33e0ef8c9eef72b86f0551644fad579b02062806b7ff9c

    • SSDEEP

      6144:Q6Uqd2GhNNK9bCUB3/bKltyu5/uHFL17unUoJBltTXL:xUi2iNE9bCUBvbOtyu5/uTPoJZ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks