General

  • Target

    JaffaCakes118_bd16fa6c96bbd94c23ccb1e1cf30c2cd

  • Size

    699KB

  • Sample

    250109-ex3ybsxrhw

  • MD5

    bd16fa6c96bbd94c23ccb1e1cf30c2cd

  • SHA1

    975646db87ac06634eb56b572f234e012a57b07a

  • SHA256

    3bd0523c2a7d176b6b13a013811e0c6dc9ce90014b823b0269b3e2e4ed7fa832

  • SHA512

    a81c7d53f1f1f9d10d1f3dd8b9266fc1f21fe2ed43aa1992a3e47416e001d20905f87199017c181e682ccf9c2c12f95ec98fe4115fb567be903dd4bc475490ec

  • SSDEEP

    12288:uB2zj/+CrtawWTlTmLkHN6DSG8cFaVVfRYDEF/ct7oSFduBCTb6HIALUdXVfIy6:HaC0wIlTWkHoDfFabRYDEFk5oSX4CTWj

Malware Config

Extracted

Family

lokibot

C2

http://smartcamainpowerizman.sytes.net/ioknfbgj/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_bd16fa6c96bbd94c23ccb1e1cf30c2cd

    • Size

      699KB

    • MD5

      bd16fa6c96bbd94c23ccb1e1cf30c2cd

    • SHA1

      975646db87ac06634eb56b572f234e012a57b07a

    • SHA256

      3bd0523c2a7d176b6b13a013811e0c6dc9ce90014b823b0269b3e2e4ed7fa832

    • SHA512

      a81c7d53f1f1f9d10d1f3dd8b9266fc1f21fe2ed43aa1992a3e47416e001d20905f87199017c181e682ccf9c2c12f95ec98fe4115fb567be903dd4bc475490ec

    • SSDEEP

      12288:uB2zj/+CrtawWTlTmLkHN6DSG8cFaVVfRYDEF/ct7oSFduBCTb6HIALUdXVfIy6:HaC0wIlTWkHoDfFabRYDEFk5oSX4CTWj

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks