General

  • Target

    660066887aff5fac3cd7b6396759a905_JaffaCakes118

  • Size

    1009KB

  • Sample

    240522-e4s2pscc6v

  • MD5

    660066887aff5fac3cd7b6396759a905

  • SHA1

    5e0027e7d708a2af94c79d945ca94339ab0b2dce

  • SHA256

    5c574701ad94c149b7496f6e738caae832bd64561c0400ba69355f9bedb80825

  • SHA512

    b0c0405acf817f3020f86f071a21e8c0cbf1e086ffe7390e424b93e0cb3506ffa4d2d8c932de28c1ee2b4d34bd55ee84bf55e949ac247e3f26aa4182db0d1bed

  • SSDEEP

    24576:hNamxn5WxOMrOj2VoNm8ODDXD7WjqKTp6RzPOZa+qYmCB7QMGe4:HzvWxHr13z7WF4R+iJ

Malware Config

Extracted

Family

lokibot

C2

http://joanread.ru/timo/fred.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      660066887aff5fac3cd7b6396759a905_JaffaCakes118

    • Size

      1009KB

    • MD5

      660066887aff5fac3cd7b6396759a905

    • SHA1

      5e0027e7d708a2af94c79d945ca94339ab0b2dce

    • SHA256

      5c574701ad94c149b7496f6e738caae832bd64561c0400ba69355f9bedb80825

    • SHA512

      b0c0405acf817f3020f86f071a21e8c0cbf1e086ffe7390e424b93e0cb3506ffa4d2d8c932de28c1ee2b4d34bd55ee84bf55e949ac247e3f26aa4182db0d1bed

    • SSDEEP

      24576:hNamxn5WxOMrOj2VoNm8ODDXD7WjqKTp6RzPOZa+qYmCB7QMGe4:HzvWxHr13z7WF4R+iJ

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks