General

  • Target

    JaffaCakes118_ac30e2486a187b3532c8ff60991268b9

  • Size

    406KB

  • Sample

    250108-zr6r9asrht

  • MD5

    ac30e2486a187b3532c8ff60991268b9

  • SHA1

    3100d33701306682e6b129c354d3139d726c9954

  • SHA256

    2ab9e22c7ab06ab9e6978fed97a0346340bb34b8188138740b4d7a5f84a163ba

  • SHA512

    0dec378b2794e31e88cc747b8409bc94bb88dc84ca9c88b601ba207fd6446c10b7e606aa1dcc6ae8bd16058e1e83679d0be5b5f58b3f8157229ffafcabcbf472

  • SSDEEP

    6144:hBlL/hlqQxBiHB354KnTppIOtFCGArQ3DOgcdkoMF247Ssd/6HQzX2:nMHAKnTsOtFTAQDOgZLFVGtHQzX2

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/ga19/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_ac30e2486a187b3532c8ff60991268b9

    • Size

      406KB

    • MD5

      ac30e2486a187b3532c8ff60991268b9

    • SHA1

      3100d33701306682e6b129c354d3139d726c9954

    • SHA256

      2ab9e22c7ab06ab9e6978fed97a0346340bb34b8188138740b4d7a5f84a163ba

    • SHA512

      0dec378b2794e31e88cc747b8409bc94bb88dc84ca9c88b601ba207fd6446c10b7e606aa1dcc6ae8bd16058e1e83679d0be5b5f58b3f8157229ffafcabcbf472

    • SSDEEP

      6144:hBlL/hlqQxBiHB354KnTppIOtFCGArQ3DOgcdkoMF247Ssd/6HQzX2:nMHAKnTsOtFTAQDOgZLFVGtHQzX2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/fqfwqcrlvs.dll

    • Size

      48KB

    • MD5

      2dcfaed029e76d404de8c562e9618fc3

    • SHA1

      ad586f14bf71ea471905da2e424e872432f60d5e

    • SHA256

      54e000d6cbf51dbda212135ecaeae42da9bbd5e4d42bfe472c1df975308ef4ec

    • SHA512

      953da849e7f926ff617a9aca550bda7693b66a58a86da4ae202d4423a926a0d0adfaf7331d9ca113f0f5c867ebaa703f467b642e2ac3735ba811868cebf0427a

    • SSDEEP

      768:n/7Fk2J334zzF1UJ+Eyp/VBdnU/4tK+Fg4JvXQxkAUQxg9q:n/7XVIzzF12+EsdnW4I+FJJ/Qx0lq

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks