General

  • Target

    7bc55f04a0bb881c06102f6acc810ef6_JaffaCakes118

  • Size

    468KB

  • Sample

    240528-fj8r4afb9s

  • MD5

    7bc55f04a0bb881c06102f6acc810ef6

  • SHA1

    ac012284474d6de67a712016bd081c8313a86bcc

  • SHA256

    684e1692c6e44c7fddaddc5ec3efc0fcd17f6d006a4ae546a68d50cdfd678641

  • SHA512

    097c870f7119b08d7e944dd84b23666083bc2c10f01c505480aa5fcb85ef5a76a9548366cdc0b258a9867c51838ced6929c13dbc40417b17982c4d8779586a7c

  • SSDEEP

    6144:Z2TWubOrvfblFN9c67RBvmt6dcpJOT70qwwwwwww6bWLf:ZzuGvzlx7zvm8Pbc

Malware Config

Extracted

Family

lokibot

C2

https://via33.net.br/painel/hamid/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      7bc55f04a0bb881c06102f6acc810ef6_JaffaCakes118

    • Size

      468KB

    • MD5

      7bc55f04a0bb881c06102f6acc810ef6

    • SHA1

      ac012284474d6de67a712016bd081c8313a86bcc

    • SHA256

      684e1692c6e44c7fddaddc5ec3efc0fcd17f6d006a4ae546a68d50cdfd678641

    • SHA512

      097c870f7119b08d7e944dd84b23666083bc2c10f01c505480aa5fcb85ef5a76a9548366cdc0b258a9867c51838ced6929c13dbc40417b17982c4d8779586a7c

    • SSDEEP

      6144:Z2TWubOrvfblFN9c67RBvmt6dcpJOT70qwwwwwww6bWLf:ZzuGvzlx7zvm8Pbc

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks