General

  • Target

    e73620259f5ec6d26ed10d9580b91437_JaffaCakes118

  • Size

    200KB

  • Sample

    240408-l6smaaef42

  • MD5

    e73620259f5ec6d26ed10d9580b91437

  • SHA1

    7d07ae6bc0c8ca5a8f9bbd0db74a5ef0dbfd187f

  • SHA256

    f228ebe1b6d660825c71c76528486d30fe68858362b0bab96a203b4eba670c35

  • SHA512

    09d831b5f19186d03d810f380cd5efa71056604fa6a190c4463a2b0d64c2c2f6d046cafda73222e8cfe2e42ca07e710998d4d41166611c2751a2636570806e59

  • SSDEEP

    3072:szPOXzmeaI4g40oNmXrD24+oBMURBXJoS9D98aShyuysfDAai//vue3E:sDOXaNg40oNPboBF5Vx98aCpL4WyE

Malware Config

Extracted

Family

lokibot

C2

http://checkvim.com/fd11/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e73620259f5ec6d26ed10d9580b91437_JaffaCakes118

    • Size

      200KB

    • MD5

      e73620259f5ec6d26ed10d9580b91437

    • SHA1

      7d07ae6bc0c8ca5a8f9bbd0db74a5ef0dbfd187f

    • SHA256

      f228ebe1b6d660825c71c76528486d30fe68858362b0bab96a203b4eba670c35

    • SHA512

      09d831b5f19186d03d810f380cd5efa71056604fa6a190c4463a2b0d64c2c2f6d046cafda73222e8cfe2e42ca07e710998d4d41166611c2751a2636570806e59

    • SSDEEP

      3072:szPOXzmeaI4g40oNmXrD24+oBMURBXJoS9D98aShyuysfDAai//vue3E:sDOXaNg40oNPboBF5Vx98aCpL4WyE

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks