General

  • Target

    JaffaCakes118_2a4fdeab13dfa08823867928dee6fc9d

  • Size

    857KB

  • Sample

    250106-sgvtnszkfx

  • MD5

    2a4fdeab13dfa08823867928dee6fc9d

  • SHA1

    1491bbbedbb085c1d4515e30120f6185fa9ce42d

  • SHA256

    b2b7cfb2aba6b8ac7812aab70766661ed82a30b68da2148e0d822f03f3497545

  • SHA512

    a1b1c8088aab4d4fc190bd836031f21c24d12b91040a25ffe541e3230062657bd1c4ceee47c725a81ccf3bb039268579e9d279aea690b2e4745fc1b7ff50edad

  • SSDEEP

    24576:UqhMQh0Ww87la1Eg8iLLUWYglWCBiWOIrdQ7Zk:hhMQhRwokR8kLPZll3rdQC

Malware Config

Extracted

Family

lokibot

C2

http://mommerishere.sytes.net/pjohuigf/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_2a4fdeab13dfa08823867928dee6fc9d

    • Size

      857KB

    • MD5

      2a4fdeab13dfa08823867928dee6fc9d

    • SHA1

      1491bbbedbb085c1d4515e30120f6185fa9ce42d

    • SHA256

      b2b7cfb2aba6b8ac7812aab70766661ed82a30b68da2148e0d822f03f3497545

    • SHA512

      a1b1c8088aab4d4fc190bd836031f21c24d12b91040a25ffe541e3230062657bd1c4ceee47c725a81ccf3bb039268579e9d279aea690b2e4745fc1b7ff50edad

    • SSDEEP

      24576:UqhMQh0Ww87la1Eg8iLLUWYglWCBiWOIrdQ7Zk:hhMQhRwokR8kLPZll3rdQC

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks