General

  • Target

    0c77faaf8084344c59818825ce4b2210_JaffaCakes118

  • Size

    104KB

  • Sample

    240501-wmcf3aeh76

  • MD5

    0c77faaf8084344c59818825ce4b2210

  • SHA1

    b47338ef859147eff4f8df3553254c47e41dc1f4

  • SHA256

    77617dba942d7cd6dfa673e2665d468b3adbc9c368d1c6991cb7cf6cd8fa0248

  • SHA512

    8d075991dc12870add3778423e07a605e0aea95339a8483a1b465b0f10c17e813c78b68031d069a2942c52c8c178ef1a255af75492affa5a3fc40f5fdeafc08f

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://anovetrade-corp.com/wordpress/ebere/Panel/details/admin/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      0c77faaf8084344c59818825ce4b2210_JaffaCakes118

    • Size

      104KB

    • MD5

      0c77faaf8084344c59818825ce4b2210

    • SHA1

      b47338ef859147eff4f8df3553254c47e41dc1f4

    • SHA256

      77617dba942d7cd6dfa673e2665d468b3adbc9c368d1c6991cb7cf6cd8fa0248

    • SHA512

      8d075991dc12870add3778423e07a605e0aea95339a8483a1b465b0f10c17e813c78b68031d069a2942c52c8c178ef1a255af75492affa5a3fc40f5fdeafc08f

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks