General

  • Target

    JaffaCakes118_d64d1b6ebcfe87c43b84001380cd3477

  • Size

    414KB

  • Sample

    250110-atzz2sxqhp

  • MD5

    d64d1b6ebcfe87c43b84001380cd3477

  • SHA1

    f91964131b130ec5c934cd17e70a3de5b2e549f6

  • SHA256

    5d7d222573cfafc45a0c51927cdfcc507914088d0e2b49edaa12556dc176df79

  • SHA512

    5c1969e806ff48d18977c82d85c1cea247289eb534dfa22e5f8ff97f4e6a169e68e8aeaa7e39712722293c5b5aca1bcc3a6caebbaf42b2959a5528396e152ca5

  • SSDEEP

    6144:GGxhLxuI6Gve+4IeZKw+LTTT0MpoY0ENnC3JdHPx3TI1:vpxxziZKw+LwMEENnC3J/G

Malware Config

Extracted

Family

lokibot

C2

http://63.250.40.204/~wpdemo/file.php?search=475803

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_d64d1b6ebcfe87c43b84001380cd3477

    • Size

      414KB

    • MD5

      d64d1b6ebcfe87c43b84001380cd3477

    • SHA1

      f91964131b130ec5c934cd17e70a3de5b2e549f6

    • SHA256

      5d7d222573cfafc45a0c51927cdfcc507914088d0e2b49edaa12556dc176df79

    • SHA512

      5c1969e806ff48d18977c82d85c1cea247289eb534dfa22e5f8ff97f4e6a169e68e8aeaa7e39712722293c5b5aca1bcc3a6caebbaf42b2959a5528396e152ca5

    • SSDEEP

      6144:GGxhLxuI6Gve+4IeZKw+LTTT0MpoY0ENnC3JdHPx3TI1:vpxxziZKw+LwMEENnC3J/G

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks