General

  • Target

    f064fe9a93ece8f472cbf5a748978cd3_JaffaCakes118

  • Size

    577KB

  • Sample

    240415-fwz1qafe55

  • MD5

    f064fe9a93ece8f472cbf5a748978cd3

  • SHA1

    c151625873763bcfd6e8f1bd70ffd3839a444fb8

  • SHA256

    d74bf61fcd9a1ea2743d24f4c418606c1d294fecfb5ed4c9634facf974dee7b1

  • SHA512

    1dd2f407f112dccba95ab41d93a327bdde2cbca3f4c1e4748f8d15656d70dbb6c1a8a00d26043d44e2369dd3bda5287ecb64db68adcfc2c3363c2dc830e6338a

  • SSDEEP

    12288:0ERs+eAn1O8Ukr1YT8025XVN/xL/DltrPP53XzM5yHLhFSS3cK:1yZAziV21VNc

Malware Config

Extracted

Family

lokibot

C2

http://filcoco.xyz/jo/vo/di.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f064fe9a93ece8f472cbf5a748978cd3_JaffaCakes118

    • Size

      577KB

    • MD5

      f064fe9a93ece8f472cbf5a748978cd3

    • SHA1

      c151625873763bcfd6e8f1bd70ffd3839a444fb8

    • SHA256

      d74bf61fcd9a1ea2743d24f4c418606c1d294fecfb5ed4c9634facf974dee7b1

    • SHA512

      1dd2f407f112dccba95ab41d93a327bdde2cbca3f4c1e4748f8d15656d70dbb6c1a8a00d26043d44e2369dd3bda5287ecb64db68adcfc2c3363c2dc830e6338a

    • SSDEEP

      12288:0ERs+eAn1O8Ukr1YT8025XVN/xL/DltrPP53XzM5yHLhFSS3cK:1yZAziV21VNc

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks