General

  • Target

    JaffaCakes118_ca66da9aeea970c1476519b769af2cf7

  • Size

    420KB

  • Sample

    250109-rn21wssjas

  • MD5

    ca66da9aeea970c1476519b769af2cf7

  • SHA1

    cd6af9d8f93867dc34d309e5de212d6be8425445

  • SHA256

    9dc5001348a4990dbe44f7e41ca10eaa0d367acde6e2c3c8c62bce4aac61e78a

  • SHA512

    5e9cb2dc2ced04c10ce124ea1294c8f7d62e3ba9cea3cf79bc73427731221f3f80a17862a300f045b3b168bd6411bcb3b33cb8c7c2b0e3a073bb1cd64f6c1a98

  • SSDEEP

    12288:3+SIcGnB/wY94oEUi2iNbNdGlwscwxZmkyO5g:OSo/z94oEUi11NQwsU0g

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/fd4/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_ca66da9aeea970c1476519b769af2cf7

    • Size

      420KB

    • MD5

      ca66da9aeea970c1476519b769af2cf7

    • SHA1

      cd6af9d8f93867dc34d309e5de212d6be8425445

    • SHA256

      9dc5001348a4990dbe44f7e41ca10eaa0d367acde6e2c3c8c62bce4aac61e78a

    • SHA512

      5e9cb2dc2ced04c10ce124ea1294c8f7d62e3ba9cea3cf79bc73427731221f3f80a17862a300f045b3b168bd6411bcb3b33cb8c7c2b0e3a073bb1cd64f6c1a98

    • SSDEEP

      12288:3+SIcGnB/wY94oEUi2iNbNdGlwscwxZmkyO5g:OSo/z94oEUi11NQwsU0g

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks