General

  • Target

    78258e55640f68f70d70fe811fbbf812_JaffaCakes118

  • Size

    104KB

  • Sample

    240527-gt4rkaae5x

  • MD5

    78258e55640f68f70d70fe811fbbf812

  • SHA1

    9cf3a1e5aedf2dba70b2e4b3c8c89a5c31121a98

  • SHA256

    6abcc2645ce5f5d1b90f3a5fdf54d55d4ad1df030e50d530d37b233395665906

  • SHA512

    918b2fe5f2d1a1f984a94cc86bc0e288ced6543bdbbd4ffffc3003b16cf465d008a81e3fb91259c6a64f4f7dbb0fa3b230ec76f432f3ebb4067b98a71178cc73

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqKIzmd:nSHIG6mQwGmfOQd8YhY0/EnUG

Malware Config

Extracted

Family

lokibot

C2

http://crippoloiutustrope.tk/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      78258e55640f68f70d70fe811fbbf812_JaffaCakes118

    • Size

      104KB

    • MD5

      78258e55640f68f70d70fe811fbbf812

    • SHA1

      9cf3a1e5aedf2dba70b2e4b3c8c89a5c31121a98

    • SHA256

      6abcc2645ce5f5d1b90f3a5fdf54d55d4ad1df030e50d530d37b233395665906

    • SHA512

      918b2fe5f2d1a1f984a94cc86bc0e288ced6543bdbbd4ffffc3003b16cf465d008a81e3fb91259c6a64f4f7dbb0fa3b230ec76f432f3ebb4067b98a71178cc73

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqKIzmd:nSHIG6mQwGmfOQd8YhY0/EnUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks