General

  • Target

    a72e534f58bf49ed07d477517a0e677a_JaffaCakes118

  • Size

    104KB

  • Sample

    240613-3vls2awdmf

  • MD5

    a72e534f58bf49ed07d477517a0e677a

  • SHA1

    d358d9ea47a487ca2ba107f00622d2127d33546f

  • SHA256

    70871088793bf3ad866e39250fcfa306b964406e7e54034c8e8304ea0fbea21f

  • SHA512

    e8a0d7bd5a4cb54b5bacd78c85a2a53c332028e14bdd961a0a61a59ee57b4519a77918259ea43d96a9bc8b556301a98e975a2164258889bcaa5468465843d309

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

https://mnbvcxz.biz/oj/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a72e534f58bf49ed07d477517a0e677a_JaffaCakes118

    • Size

      104KB

    • MD5

      a72e534f58bf49ed07d477517a0e677a

    • SHA1

      d358d9ea47a487ca2ba107f00622d2127d33546f

    • SHA256

      70871088793bf3ad866e39250fcfa306b964406e7e54034c8e8304ea0fbea21f

    • SHA512

      e8a0d7bd5a4cb54b5bacd78c85a2a53c332028e14bdd961a0a61a59ee57b4519a77918259ea43d96a9bc8b556301a98e975a2164258889bcaa5468465843d309

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks