General

  • Target

    70f4762b4700bd6c0c2566e29d124816_JaffaCakes118

  • Size

    239KB

  • Sample

    240525-fybqxafe3y

  • MD5

    70f4762b4700bd6c0c2566e29d124816

  • SHA1

    eccc437d84fd99a0bb39aa35ff4d09988b523054

  • SHA256

    66da1110fdfb8e1b6179b8fa9f67e7214d88949a9f723e8f83480d4e6feddf78

  • SHA512

    373f597a60e8b396263dc4b7bb1c8bfd4d03a3525d7a460c67d79fbdb67fd710379fa51c85147ef854ac419ca223c66d2193404df9f0d19020bc8628644e736f

  • SSDEEP

    6144:fi/gD9USSVPEuUx8RpmcD26JPDy35yyzRBN:fKO9tSV8uUOpbDLJy35yiB

Malware Config

Extracted

Family

lokibot

C2

http://31.220.40.22/~lahtipre/obasymboss/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      70f4762b4700bd6c0c2566e29d124816_JaffaCakes118

    • Size

      239KB

    • MD5

      70f4762b4700bd6c0c2566e29d124816

    • SHA1

      eccc437d84fd99a0bb39aa35ff4d09988b523054

    • SHA256

      66da1110fdfb8e1b6179b8fa9f67e7214d88949a9f723e8f83480d4e6feddf78

    • SHA512

      373f597a60e8b396263dc4b7bb1c8bfd4d03a3525d7a460c67d79fbdb67fd710379fa51c85147ef854ac419ca223c66d2193404df9f0d19020bc8628644e736f

    • SSDEEP

      6144:fi/gD9USSVPEuUx8RpmcD26JPDy35yyzRBN:fKO9tSV8uUOpbDLJy35yiB

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks