General

  • Target

    470711a8c1e49ad4e6202e21ebce34a7_JaffaCakes118

  • Size

    472KB

  • Sample

    240515-tzhgqshg68

  • MD5

    470711a8c1e49ad4e6202e21ebce34a7

  • SHA1

    f74ffca223feb25c1bda6229c245d7aa31234cfe

  • SHA256

    38566f9a331bb8503835d7abfdc027d9d3fa45c65f388d7fd84b2c97f297ba85

  • SHA512

    0a6d973ac9bf6ab2224c59969595603f4fa41c0d4c92b92a30a76872e08033c48ec82ec926efe1aa24d1863181d08dd9ef67d65466291866173a074c7e5304b0

  • SSDEEP

    6144:5YFmEvMGFpB5fzKL87p7yC5KCpQSZc/t6KiuOVRDyXteftTOj:5YQyFpB5fzKL8dL5G+J0XYTO

Malware Config

Extracted

Family

lokibot

C2

http://jayp.eu/loki/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      470711a8c1e49ad4e6202e21ebce34a7_JaffaCakes118

    • Size

      472KB

    • MD5

      470711a8c1e49ad4e6202e21ebce34a7

    • SHA1

      f74ffca223feb25c1bda6229c245d7aa31234cfe

    • SHA256

      38566f9a331bb8503835d7abfdc027d9d3fa45c65f388d7fd84b2c97f297ba85

    • SHA512

      0a6d973ac9bf6ab2224c59969595603f4fa41c0d4c92b92a30a76872e08033c48ec82ec926efe1aa24d1863181d08dd9ef67d65466291866173a074c7e5304b0

    • SSDEEP

      6144:5YFmEvMGFpB5fzKL87p7yC5KCpQSZc/t6KiuOVRDyXteftTOj:5YQyFpB5fzKL8dL5G+J0XYTO

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks