General

  • Target

    fce02d5ae70e73ef9e8d23fbc58c4796_JaffaCakes118

  • Size

    547KB

  • Sample

    240420-qtxspaad8z

  • MD5

    fce02d5ae70e73ef9e8d23fbc58c4796

  • SHA1

    ee387ebd9710923fd37b16366c009848013701d4

  • SHA256

    1264a71074a9c7b6e582a466b7b2d6c0fbfd6e04212a72bf75349b7c6e1b43c4

  • SHA512

    8a317f6f9d9b9ac41766e1b28381ab84c0cb0e14a438210db1b7f6b822e2bf3c433737d9cc597c74c20fcde5e3706981faebc10f6c1e777563cd138fcee011a6

  • SSDEEP

    12288:e43a5aXblplsKlfMcSYqbXu+tWmn+wzVCHxVEOMjtVv4:e43oMhsKlfMcS0

Malware Config

Extracted

Family

lokibot

C2

http://ccjjlogsx.com/uu/me/ii.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fce02d5ae70e73ef9e8d23fbc58c4796_JaffaCakes118

    • Size

      547KB

    • MD5

      fce02d5ae70e73ef9e8d23fbc58c4796

    • SHA1

      ee387ebd9710923fd37b16366c009848013701d4

    • SHA256

      1264a71074a9c7b6e582a466b7b2d6c0fbfd6e04212a72bf75349b7c6e1b43c4

    • SHA512

      8a317f6f9d9b9ac41766e1b28381ab84c0cb0e14a438210db1b7f6b822e2bf3c433737d9cc597c74c20fcde5e3706981faebc10f6c1e777563cd138fcee011a6

    • SSDEEP

      12288:e43a5aXblplsKlfMcSYqbXu+tWmn+wzVCHxVEOMjtVv4:e43oMhsKlfMcS0

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks