General

  • Target

    fb19434fc1328583cf86a06442960fd4_JaffaCakes118

  • Size

    609KB

  • Sample

    240419-y572ssef25

  • MD5

    fb19434fc1328583cf86a06442960fd4

  • SHA1

    da744df0f0d4b669c36996f0cd135c6c77153ab1

  • SHA256

    3caa2ce46c3c7fd2fd8a56371a56f0c6dd355fdeaa139eb7cdf3bf7a1360e6f5

  • SHA512

    54fe2c5338f50b2dc17e60bf4e4e821db4c0706175c9581eadc51871284d630900ecaad2736f671e6ce19b4ffe48ad2b5e3b06ee5086c8fb30fc989d0edce053

  • SSDEEP

    12288:s5JJxemKtnZ6Ef1U7O0SuZaPsZeHEYXfVXUcwT15HT3Me:s5j6tnsf+uki4EYXfKLHT3Me

Malware Config

Extracted

Family

lokibot

C2

http://155.254.33.183/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fb19434fc1328583cf86a06442960fd4_JaffaCakes118

    • Size

      609KB

    • MD5

      fb19434fc1328583cf86a06442960fd4

    • SHA1

      da744df0f0d4b669c36996f0cd135c6c77153ab1

    • SHA256

      3caa2ce46c3c7fd2fd8a56371a56f0c6dd355fdeaa139eb7cdf3bf7a1360e6f5

    • SHA512

      54fe2c5338f50b2dc17e60bf4e4e821db4c0706175c9581eadc51871284d630900ecaad2736f671e6ce19b4ffe48ad2b5e3b06ee5086c8fb30fc989d0edce053

    • SSDEEP

      12288:s5JJxemKtnZ6Ef1U7O0SuZaPsZeHEYXfVXUcwT15HT3Me:s5j6tnsf+uki4EYXfKLHT3Me

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks