General

  • Target

    fc0a293c2c8c94e0d335ff5012a194f0_JaffaCakes118

  • Size

    847KB

  • Sample

    240420-ga8amsae5v

  • MD5

    fc0a293c2c8c94e0d335ff5012a194f0

  • SHA1

    9e63213e36590df2d146fdea7b21902136b27b73

  • SHA256

    77ada8345e7bd235de0c3660ce802f3b8105da41e16b6cdadd2274d53f42df7a

  • SHA512

    23f02d4fac22e22c53aa7f73f77d299fdbfd6238b202221cb13b5f909eae66f92ac0e9c4855b35e76f8de1112dd68a63ba113ab435b63c38c71484a42710520c

  • SSDEEP

    24576:k2kBiad50iXd37pf4HVchOe1lFQb/CoI18:IBi8FI1cFvQb

Malware Config

Extracted

Family

lokibot

C2

http://frinqy.gq/apps/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fc0a293c2c8c94e0d335ff5012a194f0_JaffaCakes118

    • Size

      847KB

    • MD5

      fc0a293c2c8c94e0d335ff5012a194f0

    • SHA1

      9e63213e36590df2d146fdea7b21902136b27b73

    • SHA256

      77ada8345e7bd235de0c3660ce802f3b8105da41e16b6cdadd2274d53f42df7a

    • SHA512

      23f02d4fac22e22c53aa7f73f77d299fdbfd6238b202221cb13b5f909eae66f92ac0e9c4855b35e76f8de1112dd68a63ba113ab435b63c38c71484a42710520c

    • SSDEEP

      24576:k2kBiad50iXd37pf4HVchOe1lFQb/CoI18:IBi8FI1cFvQb

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks