General

  • Target

    1fd4180be1b80c421b832316ee569d19_JaffaCakes118

  • Size

    104KB

  • Sample

    240507-hxt7zaea9t

  • MD5

    1fd4180be1b80c421b832316ee569d19

  • SHA1

    e23f1ed31da64b36b9c6f690fa05183ca90c5eeb

  • SHA256

    92d31f2ec8d269d795033ceb6b42787486c3b781905730b7905dbfb6c37a9f76

  • SHA512

    b5e7894066be555e1065ab56aea40eb4aa9a751e50195bd30acd478bc2d9528b1d27d27f45cb104d08696bde466a7cb12f4c38c3b073c63254d0d2ab1874f6d7

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://cultiva-es.co/rent/clod/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      1fd4180be1b80c421b832316ee569d19_JaffaCakes118

    • Size

      104KB

    • MD5

      1fd4180be1b80c421b832316ee569d19

    • SHA1

      e23f1ed31da64b36b9c6f690fa05183ca90c5eeb

    • SHA256

      92d31f2ec8d269d795033ceb6b42787486c3b781905730b7905dbfb6c37a9f76

    • SHA512

      b5e7894066be555e1065ab56aea40eb4aa9a751e50195bd30acd478bc2d9528b1d27d27f45cb104d08696bde466a7cb12f4c38c3b073c63254d0d2ab1874f6d7

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks