General

  • Target

    c4151a67fe4412821d43b0f5297d7004_JaffaCakes118

  • Size

    317KB

  • Sample

    240404-2zgt7scg7y

  • MD5

    c4151a67fe4412821d43b0f5297d7004

  • SHA1

    6970f5c040febebbd06f6ce909d3b4daac04f8bb

  • SHA256

    a001d248a75b25696fc58e278aa37fb21a81dd6a2fa4ee5c126d37412cb4b993

  • SHA512

    843681945771ca655423641ea2a6a634ef1dec40d28c301daaa847a5a6241f6c7a380c713c3630993e71117673a28d187b789905b213e9b9bfd5e6536a2ee0c6

  • SSDEEP

    6144:WZT46FBxhEAXqXCrdgP1R0oHQikJI0oF4wM:MEmlEQ8CrdgPAoHQiYoh

Malware Config

Extracted

Family

lokibot

C2

http://63.250.40.204/~wpdemo/file.php?search=386869

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c4151a67fe4412821d43b0f5297d7004_JaffaCakes118

    • Size

      317KB

    • MD5

      c4151a67fe4412821d43b0f5297d7004

    • SHA1

      6970f5c040febebbd06f6ce909d3b4daac04f8bb

    • SHA256

      a001d248a75b25696fc58e278aa37fb21a81dd6a2fa4ee5c126d37412cb4b993

    • SHA512

      843681945771ca655423641ea2a6a634ef1dec40d28c301daaa847a5a6241f6c7a380c713c3630993e71117673a28d187b789905b213e9b9bfd5e6536a2ee0c6

    • SSDEEP

      6144:WZT46FBxhEAXqXCrdgP1R0oHQikJI0oF4wM:MEmlEQ8CrdgPAoHQiYoh

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks