General

  • Target

    JaffaCakes118_4a01bb13ad043b84697166d7705b1028

  • Size

    426KB

  • Sample

    250107-dmjk9s1net

  • MD5

    4a01bb13ad043b84697166d7705b1028

  • SHA1

    49d117f3df6e205bb6899e57255b249adeb4f965

  • SHA256

    f6ac542852beb59ae8f01a9290d359cc0b5487c8926264b29398bba0ce73c474

  • SHA512

    8977e5cdeff0849439e0b2cdabaa5ff33f731df716c18d004a8acd14f9335ec0c52909f8f2a9e7fa4d2e4a5f59b836035dc2612ac0984e48ab7bc0cccc1df9d2

  • SSDEEP

    6144:0GxhLTAIxrvAbMe+iNX/KR7xbpQ9DJCe+VxxfFW7LdbP8RlgedyeihypTJ1:drtk+iNX/m7x69MeExhsdbugoynK

Malware Config

Extracted

Family

lokibot

C2

http://63.250.40.204/~wpdemo/file.php?search=9099522

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_4a01bb13ad043b84697166d7705b1028

    • Size

      426KB

    • MD5

      4a01bb13ad043b84697166d7705b1028

    • SHA1

      49d117f3df6e205bb6899e57255b249adeb4f965

    • SHA256

      f6ac542852beb59ae8f01a9290d359cc0b5487c8926264b29398bba0ce73c474

    • SHA512

      8977e5cdeff0849439e0b2cdabaa5ff33f731df716c18d004a8acd14f9335ec0c52909f8f2a9e7fa4d2e4a5f59b836035dc2612ac0984e48ab7bc0cccc1df9d2

    • SSDEEP

      6144:0GxhLTAIxrvAbMe+iNX/KR7xbpQ9DJCe+VxxfFW7LdbP8RlgedyeihypTJ1:drtk+iNX/m7x69MeExhsdbugoynK

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks