General

  • Target

    8119e23b9fc401e806f537b2acf6cd72_JaffaCakes118

  • Size

    50KB

  • Sample

    240529-r3514aad67

  • MD5

    8119e23b9fc401e806f537b2acf6cd72

  • SHA1

    4866a0e8011910f6469bf838c5ef117da0e63406

  • SHA256

    9ae74c46275688fb2c296b50eda506c77d4c54129b39c08a2ea1c2b2db1ce040

  • SHA512

    a9983a3091bb50d7686083220a89b6b0407ed3cbc8a741bc5d184b0058bf1d1966603c9c4afec72959b440f79a8c6db8c6acd4ee92007cc893319dc8e2db8134

  • SSDEEP

    768:5OjtpstW9JrJvmZTb+x22GGTZEQbOAS4EaRn6ZU+WwsdnxWrCqVHcklLahCOA+76:5ORpJuavOiRuU2j8ktahCOZJipv

Malware Config

Extracted

Family

lokibot

C2

http://unifarmex.net/hsp1/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      8119e23b9fc401e806f537b2acf6cd72_JaffaCakes118

    • Size

      50KB

    • MD5

      8119e23b9fc401e806f537b2acf6cd72

    • SHA1

      4866a0e8011910f6469bf838c5ef117da0e63406

    • SHA256

      9ae74c46275688fb2c296b50eda506c77d4c54129b39c08a2ea1c2b2db1ce040

    • SHA512

      a9983a3091bb50d7686083220a89b6b0407ed3cbc8a741bc5d184b0058bf1d1966603c9c4afec72959b440f79a8c6db8c6acd4ee92007cc893319dc8e2db8134

    • SSDEEP

      768:5OjtpstW9JrJvmZTb+x22GGTZEQbOAS4EaRn6ZU+WwsdnxWrCqVHcklLahCOA+76:5ORpJuavOiRuU2j8ktahCOZJipv

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks