General

  • Target

    6a285391ed34b16312fc31a770fd597a_JaffaCakes118

  • Size

    680KB

  • Sample

    240523-h357eshc32

  • MD5

    6a285391ed34b16312fc31a770fd597a

  • SHA1

    9d753e8c30f0a2464691400afb7bd3bf64b3293a

  • SHA256

    baf19dcd5d48485df393391c98aece345b13532db21093eafff290135820da7f

  • SHA512

    2116e380a3b9f040dda8876506508b06b7b3b321e8f7fe2721d979822540acf2bfb1afed7db0ec222167ab60a5bd4c9cb8056b579f422c1718261d7d858667cb

  • SSDEEP

    12288:nwPXKU1C/FLaEBKDXUsbVTscwsSHdx15Qm4nAsb/QGI+ndBg6Yx8VD/IJa4yj0v0:nwXK3Na7TsJsSHhGnAsbIGI0BgpxmDwW

Malware Config

Extracted

Family

lokibot

C2

http://pcipoc.com/broker/five/PvqDq929BSx_A_D_M1n_a.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6a285391ed34b16312fc31a770fd597a_JaffaCakes118

    • Size

      680KB

    • MD5

      6a285391ed34b16312fc31a770fd597a

    • SHA1

      9d753e8c30f0a2464691400afb7bd3bf64b3293a

    • SHA256

      baf19dcd5d48485df393391c98aece345b13532db21093eafff290135820da7f

    • SHA512

      2116e380a3b9f040dda8876506508b06b7b3b321e8f7fe2721d979822540acf2bfb1afed7db0ec222167ab60a5bd4c9cb8056b579f422c1718261d7d858667cb

    • SSDEEP

      12288:nwPXKU1C/FLaEBKDXUsbVTscwsSHdx15Qm4nAsb/QGI+ndBg6Yx8VD/IJa4yj0v0:nwXK3Na7TsJsSHhGnAsbIGI0BgpxmDwW

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks