General

  • Target

    6d2bbff6fb36a6da49fc7d5b50f472eb_JaffaCakes118

  • Size

    335KB

  • Sample

    240524-dvy1xsbc2w

  • MD5

    6d2bbff6fb36a6da49fc7d5b50f472eb

  • SHA1

    58dea343b05397e2e27e810dfb33254a8ef1a764

  • SHA256

    f76d5f6cbcfe6868c2794366be83cd30723e592e66513028096322cb8c2adde0

  • SHA512

    fc0300c5171f53520224a6623f500cf9ed7b9df5dd1105d5e3e98a12f079a8904384d88e77e1f2298ff58a9adfe013cb27c8f2c7b4b90eac17cf750a24c54325

  • SSDEEP

    6144:84oYYvFKbdPRsJoRmEtprxZbzH42KGMottE:8mLrxZ342K2

Malware Config

Extracted

Family

lokibot

C2

http://bibpap.com/1g7/pin.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6d2bbff6fb36a6da49fc7d5b50f472eb_JaffaCakes118

    • Size

      335KB

    • MD5

      6d2bbff6fb36a6da49fc7d5b50f472eb

    • SHA1

      58dea343b05397e2e27e810dfb33254a8ef1a764

    • SHA256

      f76d5f6cbcfe6868c2794366be83cd30723e592e66513028096322cb8c2adde0

    • SHA512

      fc0300c5171f53520224a6623f500cf9ed7b9df5dd1105d5e3e98a12f079a8904384d88e77e1f2298ff58a9adfe013cb27c8f2c7b4b90eac17cf750a24c54325

    • SSDEEP

      6144:84oYYvFKbdPRsJoRmEtprxZbzH42KGMottE:8mLrxZ342K2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks