General

  • Target

    440852322d95e908101cc77eb4f19a9b_JaffaCakes118

  • Size

    104KB

  • Sample

    240515-b5zzvsbb3v

  • MD5

    440852322d95e908101cc77eb4f19a9b

  • SHA1

    f788aa6162350a71c8fc947b4ed47448b267802e

  • SHA256

    0235ab0dff5ef5a4027787bb6d030abaea80df9a7e0cba67f99f8bd0f292529d

  • SHA512

    33d84b39d8684607a4d6d4730a47feaa97118b60091406464ab3cd7d0497e30a905087e00f1c403cd8e8b093cac370cce059538abb04f4b24c2adf0b2fb366b8

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://execuitiveship.com/favours/follow/me/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      440852322d95e908101cc77eb4f19a9b_JaffaCakes118

    • Size

      104KB

    • MD5

      440852322d95e908101cc77eb4f19a9b

    • SHA1

      f788aa6162350a71c8fc947b4ed47448b267802e

    • SHA256

      0235ab0dff5ef5a4027787bb6d030abaea80df9a7e0cba67f99f8bd0f292529d

    • SHA512

      33d84b39d8684607a4d6d4730a47feaa97118b60091406464ab3cd7d0497e30a905087e00f1c403cd8e8b093cac370cce059538abb04f4b24c2adf0b2fb366b8

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks