General

  • Target

    0f862236203591d35d2afb9c415ed02e_JaffaCakes118

  • Size

    104KB

  • Sample

    240503-dkjs9add81

  • MD5

    0f862236203591d35d2afb9c415ed02e

  • SHA1

    12f7a3cd98da0b6e5ef705de55415065dd472d4d

  • SHA256

    6b5b59719af8ca58a46ad20ca888e023d2124cf75d6702aeb09ab4856ccf73d4

  • SHA512

    542878037847142d7347a66e51840ce486588fcc229a9165965527994571243ba7c95d36922b3fde7cb17f91f22e2672096a2780cf3f505e02847f842e43240f

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://kelex.pw/ej/css/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      0f862236203591d35d2afb9c415ed02e_JaffaCakes118

    • Size

      104KB

    • MD5

      0f862236203591d35d2afb9c415ed02e

    • SHA1

      12f7a3cd98da0b6e5ef705de55415065dd472d4d

    • SHA256

      6b5b59719af8ca58a46ad20ca888e023d2124cf75d6702aeb09ab4856ccf73d4

    • SHA512

      542878037847142d7347a66e51840ce486588fcc229a9165965527994571243ba7c95d36922b3fde7cb17f91f22e2672096a2780cf3f505e02847f842e43240f

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks