General

  • Target

    JaffaCakes118_65c84a143ebe579a56d16b9628e042ea

  • Size

    395KB

  • Sample

    250107-qtlqestjat

  • MD5

    65c84a143ebe579a56d16b9628e042ea

  • SHA1

    ce988611870cdabd04fba38176555ca4815ffd4e

  • SHA256

    ed84a6cb70969bc490e4b72bd028652cde787dcda41b5cfa7ed18ed7f592b9eb

  • SHA512

    62c16119c5aceac7859fd9d9fadd19535319f73b1dd1f0169b715471a51d2b65238fe161f438241e00f63e9540610596937d06dd057460751b7e61cc4af4f18d

  • SSDEEP

    6144:hsonJH5wognja6Uqd2GhNBSgDh0kBE7woo3eDYCFwdjLvgSHKAm9:PHgjUi2iNtDuk67ZPDfFwdLvhM

Malware Config

Extracted

Family

lokibot

C2

http://63.250.40.204/~wpdemo/file.php?search=835338

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_65c84a143ebe579a56d16b9628e042ea

    • Size

      395KB

    • MD5

      65c84a143ebe579a56d16b9628e042ea

    • SHA1

      ce988611870cdabd04fba38176555ca4815ffd4e

    • SHA256

      ed84a6cb70969bc490e4b72bd028652cde787dcda41b5cfa7ed18ed7f592b9eb

    • SHA512

      62c16119c5aceac7859fd9d9fadd19535319f73b1dd1f0169b715471a51d2b65238fe161f438241e00f63e9540610596937d06dd057460751b7e61cc4af4f18d

    • SSDEEP

      6144:hsonJH5wognja6Uqd2GhNBSgDh0kBE7woo3eDYCFwdjLvgSHKAm9:PHgjUi2iNtDuk67ZPDfFwdLvhM

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks