General

  • Target

    588932a4466e7152ae5ee285ae53aa25_JaffaCakes118

  • Size

    228KB

  • Sample

    240519-e24enaac91

  • MD5

    588932a4466e7152ae5ee285ae53aa25

  • SHA1

    16fe85fbe49b4c343989f8e55241f06219348bea

  • SHA256

    bf2095a5d7669d89ae49c4d38ec35aeb37e72702f987cc2ef10faa4f63fd6527

  • SHA512

    2a098c96631dc6ef99978e298fec4611e57ce702aa15236d65d1b193be5aa415240b141763e0b7817a5a9cd6fd524b28ec3c6edce2dd92697482f82a3a0063b9

  • SSDEEP

    3072:cfjLajb87as6j5dnPR3OvmsaEgBeEGkoDGXMtOjhaomQqfVuM8SKFoD8FZ6UT6J:yOnGa/j5hVMm8xeMtOwZQqfGSMZFr6

Malware Config

Extracted

Family

lokibot

C2

http://104.250.162.22/panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      588932a4466e7152ae5ee285ae53aa25_JaffaCakes118

    • Size

      228KB

    • MD5

      588932a4466e7152ae5ee285ae53aa25

    • SHA1

      16fe85fbe49b4c343989f8e55241f06219348bea

    • SHA256

      bf2095a5d7669d89ae49c4d38ec35aeb37e72702f987cc2ef10faa4f63fd6527

    • SHA512

      2a098c96631dc6ef99978e298fec4611e57ce702aa15236d65d1b193be5aa415240b141763e0b7817a5a9cd6fd524b28ec3c6edce2dd92697482f82a3a0063b9

    • SSDEEP

      3072:cfjLajb87as6j5dnPR3OvmsaEgBeEGkoDGXMtOjhaomQqfVuM8SKFoD8FZ6UT6J:yOnGa/j5hVMm8xeMtOwZQqfGSMZFr6

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks