General

  • Target

    JaffaCakes118_41679b00d07be66805d1ae7581b72212

  • Size

    271KB

  • Sample

    250106-3smybawjal

  • MD5

    41679b00d07be66805d1ae7581b72212

  • SHA1

    b9163e5c5a598bbb0e040d3e97cd46997c4fbeba

  • SHA256

    95024452dbbb0413a87d7c64632f7ae988057eb19fb374b1c6acb7e84e1d1cb8

  • SHA512

    3de517e249144190c1fa4105ac911db7981c44e0c0a1581652867daef2cc40115c4fe8dea9180996aed2c6979c902ab1d3e3f206f51aefc5d9538584d9769ac2

  • SSDEEP

    6144:3tn/g5eVbsbjGqFhMVZR9sNXlTEGtxh2:3V45eVboL8ZR9sNNVtG

Malware Config

Extracted

Family

lokibot

C2

http://iykl2.xyz/Spartan/w2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_41679b00d07be66805d1ae7581b72212

    • Size

      271KB

    • MD5

      41679b00d07be66805d1ae7581b72212

    • SHA1

      b9163e5c5a598bbb0e040d3e97cd46997c4fbeba

    • SHA256

      95024452dbbb0413a87d7c64632f7ae988057eb19fb374b1c6acb7e84e1d1cb8

    • SHA512

      3de517e249144190c1fa4105ac911db7981c44e0c0a1581652867daef2cc40115c4fe8dea9180996aed2c6979c902ab1d3e3f206f51aefc5d9538584d9769ac2

    • SSDEEP

      6144:3tn/g5eVbsbjGqFhMVZR9sNXlTEGtxh2:3V45eVboL8ZR9sNNVtG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks