General

  • Target

    75e770d9841b9b53bb349e1d998a0999_JaffaCakes118

  • Size

    104KB

  • Sample

    240526-sp43babg25

  • MD5

    75e770d9841b9b53bb349e1d998a0999

  • SHA1

    f4639ddfe1fd1f04082711091f43d39f3f05b85f

  • SHA256

    f2c2124ec57f8d171f42e5d2f4f19004687b97ff24daee75ef42e57fda7f885c

  • SHA512

    bdecb262eeeccbdb2bbc89f33ae02057528ec687a67d0fa80aafa0cf70855bc2d22b19d80ca3768cb9b0f61219edd43a28908dc8496667ff8fbeaaab7fa78bb9

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://atharabnday.com/web_content/file/log/css/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      75e770d9841b9b53bb349e1d998a0999_JaffaCakes118

    • Size

      104KB

    • MD5

      75e770d9841b9b53bb349e1d998a0999

    • SHA1

      f4639ddfe1fd1f04082711091f43d39f3f05b85f

    • SHA256

      f2c2124ec57f8d171f42e5d2f4f19004687b97ff24daee75ef42e57fda7f885c

    • SHA512

      bdecb262eeeccbdb2bbc89f33ae02057528ec687a67d0fa80aafa0cf70855bc2d22b19d80ca3768cb9b0f61219edd43a28908dc8496667ff8fbeaaab7fa78bb9

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks