General

  • Target

    5116d8721b3d13837a7620c9b6958850_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240517-x3v4saeh44

  • MD5

    5116d8721b3d13837a7620c9b6958850

  • SHA1

    d402b7af22658ced3156596f7b4bc2b7dec3e514

  • SHA256

    09746ba6237daef52ac3d96ed2b9bcec5e4b992a8950daa283a50abb3403ed48

  • SHA512

    37cf04bbf80373a46b17ac47f303f0a5dbaa69e5797a5438af8d8e21f0b4094e4ea8c2ceffa660da5af8599d9b38f121d72687b49aa9378b3316d1a6de6e3a3c

  • SSDEEP

    24576:oM2i94KHSyvzoG44iahLWvUWjqKTp6RzPOZa+qYmCvwGea:oMbHdWF4R+vH

Malware Config

Extracted

Family

lokibot

C2

http://ledrazen.com/lewy/sun/zeya/solar/gem/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5116d8721b3d13837a7620c9b6958850_JaffaCakes118

    • Size

      1.1MB

    • MD5

      5116d8721b3d13837a7620c9b6958850

    • SHA1

      d402b7af22658ced3156596f7b4bc2b7dec3e514

    • SHA256

      09746ba6237daef52ac3d96ed2b9bcec5e4b992a8950daa283a50abb3403ed48

    • SHA512

      37cf04bbf80373a46b17ac47f303f0a5dbaa69e5797a5438af8d8e21f0b4094e4ea8c2ceffa660da5af8599d9b38f121d72687b49aa9378b3316d1a6de6e3a3c

    • SSDEEP

      24576:oM2i94KHSyvzoG44iahLWvUWjqKTp6RzPOZa+qYmCvwGea:oMbHdWF4R+vH

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks