General

  • Target

    JaffaCakes118_2a08027bf00e973f2b87ce0d5b38cb3f

  • Size

    547KB

  • Sample

    241231-vjld5asmel

  • MD5

    2a08027bf00e973f2b87ce0d5b38cb3f

  • SHA1

    8cfd368830e3936191fb535491323647b5750d56

  • SHA256

    a597c9adad43eb569c5471e5fbd94944a023000bd495ce2da02dbdd0b6f3385e

  • SHA512

    cb87f4a93c0aa1b9b918b5baf16e51fd60548e9b02e0faf7504a33b8f6104388d97f7cda41874a27c8e290bb57390afbb7958f0dea446ef272ffac87d97755f4

  • SSDEEP

    12288:WXKj7FY0OzG/x4Ic4wTgUi0RoOGj8UxedbxoFKl7mUNWPdwkWTqRu1+:W6FdOyZ4I7RMo5W1+

Malware Config

Extracted

Family

lokibot

C2

http://63.250.40.204/~wpdemo/file.php?search=page321

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_2a08027bf00e973f2b87ce0d5b38cb3f

    • Size

      547KB

    • MD5

      2a08027bf00e973f2b87ce0d5b38cb3f

    • SHA1

      8cfd368830e3936191fb535491323647b5750d56

    • SHA256

      a597c9adad43eb569c5471e5fbd94944a023000bd495ce2da02dbdd0b6f3385e

    • SHA512

      cb87f4a93c0aa1b9b918b5baf16e51fd60548e9b02e0faf7504a33b8f6104388d97f7cda41874a27c8e290bb57390afbb7958f0dea446ef272ffac87d97755f4

    • SSDEEP

      12288:WXKj7FY0OzG/x4Ic4wTgUi0RoOGj8UxedbxoFKl7mUNWPdwkWTqRu1+:W6FdOyZ4I7RMo5W1+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks