General

  • Target

    2347514a176733089ab6901d559094ad_JaffaCakes118

  • Size

    224KB

  • Sample

    240508-fjk12abg5v

  • MD5

    2347514a176733089ab6901d559094ad

  • SHA1

    34a2c3097bc06409b04698c6d2e19bbbf080fa34

  • SHA256

    251d3a1bc3a5285919ba7979ad3d13d5dfc54859785d44db9c409e7a07f467a2

  • SHA512

    7122a9be2dae999afad0ee88c66ee1aad5f31719d7f743808d6979dad4691de1f142ebeda1953dbfd4961d048e08866682750d11b280bd753dab6691a4e33808

  • SSDEEP

    6144:AkQFDEF1+zlssQHaI8GrC9qa0aM6z3J68s8I2Q:AkKlxwa3GrCxlM6z3JPs8Ij

Malware Config

Extracted

Family

lokibot

C2

http://kelex.pw/ej/css/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2347514a176733089ab6901d559094ad_JaffaCakes118

    • Size

      224KB

    • MD5

      2347514a176733089ab6901d559094ad

    • SHA1

      34a2c3097bc06409b04698c6d2e19bbbf080fa34

    • SHA256

      251d3a1bc3a5285919ba7979ad3d13d5dfc54859785d44db9c409e7a07f467a2

    • SHA512

      7122a9be2dae999afad0ee88c66ee1aad5f31719d7f743808d6979dad4691de1f142ebeda1953dbfd4961d048e08866682750d11b280bd753dab6691a4e33808

    • SSDEEP

      6144:AkQFDEF1+zlssQHaI8GrC9qa0aM6z3J68s8I2Q:AkKlxwa3GrCxlM6z3JPs8Ij

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks