General

  • Target

    5483f1f6747c896b2d6c9cf3a1927134_JaffaCakes118

  • Size

    239KB

  • Sample

    240518-nsmj8ahf8v

  • MD5

    5483f1f6747c896b2d6c9cf3a1927134

  • SHA1

    9eead6068e8e374de2c94a44ab81ba0162ae4594

  • SHA256

    97747db97d3020ab4d1a110e84b46b47c6a62936c73e2a7236fd8e8a4bcb46bd

  • SHA512

    7c7f3fc249acb7491d4fa708be7637be23d6e30b9ef730180f380803c608dc640370a2f93525f2eb7aff8cab383dfd3e2fe412a42b43aaee4cb2ed02e3e20451

  • SSDEEP

    6144:sLtc+05VBHbOUtrFwQ1Obxe9Gkv3zTf6jxayve7+Z0Pj:gc7VJbVtrF9ObNgyvw+Zaj

Malware Config

Extracted

Family

lokibot

C2

http://31.220.40.22/~bvcgroup/symboss/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5483f1f6747c896b2d6c9cf3a1927134_JaffaCakes118

    • Size

      239KB

    • MD5

      5483f1f6747c896b2d6c9cf3a1927134

    • SHA1

      9eead6068e8e374de2c94a44ab81ba0162ae4594

    • SHA256

      97747db97d3020ab4d1a110e84b46b47c6a62936c73e2a7236fd8e8a4bcb46bd

    • SHA512

      7c7f3fc249acb7491d4fa708be7637be23d6e30b9ef730180f380803c608dc640370a2f93525f2eb7aff8cab383dfd3e2fe412a42b43aaee4cb2ed02e3e20451

    • SSDEEP

      6144:sLtc+05VBHbOUtrFwQ1Obxe9Gkv3zTf6jxayve7+Z0Pj:gc7VJbVtrF9ObNgyvw+Zaj

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks