General

  • Target

    JaffaCakes118_2da4313d81184d2c0063b445600a8625

  • Size

    356KB

  • Sample

    250106-tqzdwstjer

  • MD5

    2da4313d81184d2c0063b445600a8625

  • SHA1

    96dc61bbd4d509cb444b0205be54ac49a324ad0c

  • SHA256

    67f8378339fc891cadd30317342a26b55ef14f2421044aea9560b2058619ff76

  • SHA512

    b690f4a3a2781cbfdc5e697040ec94b7a60bef5fe2a2fbccfdb86c6a92ba45daf0f5385421ae88587ab735b6854eeda1bd13206866c837446ca0fb6e40a590dd

  • SSDEEP

    6144:8O3m4LfqbTwCn6+mLctk/Nj5KqYQslEc1sgq9CIKhzR0A6yIFi:eTb0Cn6TLcC/aDQs+tgaChhzR0l

Malware Config

Extracted

Family

lokibot

C2

http://checkvim.com/ga17/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_2da4313d81184d2c0063b445600a8625

    • Size

      356KB

    • MD5

      2da4313d81184d2c0063b445600a8625

    • SHA1

      96dc61bbd4d509cb444b0205be54ac49a324ad0c

    • SHA256

      67f8378339fc891cadd30317342a26b55ef14f2421044aea9560b2058619ff76

    • SHA512

      b690f4a3a2781cbfdc5e697040ec94b7a60bef5fe2a2fbccfdb86c6a92ba45daf0f5385421ae88587ab735b6854eeda1bd13206866c837446ca0fb6e40a590dd

    • SSDEEP

      6144:8O3m4LfqbTwCn6+mLctk/Nj5KqYQslEc1sgq9CIKhzR0A6yIFi:eTb0Cn6TLcC/aDQs+tgaChhzR0l

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks