General

  • Target

    JaffaCakes118_cf7684cdcea68d53f998e9649f219f07

  • Size

    369KB

  • Sample

    250109-xcrzfaxmcs

  • MD5

    cf7684cdcea68d53f998e9649f219f07

  • SHA1

    379484cbdc07065312991a40cc70cf95b1568f15

  • SHA256

    1c1579fe553e9ff16ce0cd5b3c0ab28e9cb496708fa14f48ee721309869523dc

  • SHA512

    9c286cae4f82c4537fc1744e8f13be7d500a499b8601325d70d3d9fdcd8156bbed7279e92101fc6d80797db3bf988dca25fbb5e5c75455839c2b1f3d50db761b

  • SSDEEP

    6144:Q6Uqd2GhNNK9bCUB3/bKltyu5/uHFL17unUoJBltTXL7:xUi2iNE9bCUBvbOtyu5/uTPoJZ7

Malware Config

Extracted

Family

lokibot

C2

http://bobbyelectronics.xyz/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_cf7684cdcea68d53f998e9649f219f07

    • Size

      369KB

    • MD5

      cf7684cdcea68d53f998e9649f219f07

    • SHA1

      379484cbdc07065312991a40cc70cf95b1568f15

    • SHA256

      1c1579fe553e9ff16ce0cd5b3c0ab28e9cb496708fa14f48ee721309869523dc

    • SHA512

      9c286cae4f82c4537fc1744e8f13be7d500a499b8601325d70d3d9fdcd8156bbed7279e92101fc6d80797db3bf988dca25fbb5e5c75455839c2b1f3d50db761b

    • SSDEEP

      6144:Q6Uqd2GhNNK9bCUB3/bKltyu5/uHFL17unUoJBltTXL7:xUi2iNE9bCUBvbOtyu5/uTPoJZ7

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks