General

  • Target

    a493d84bf6ad957599c3004490197031_JaffaCakes118

  • Size

    104KB

  • Sample

    240613-j5qp7a1ala

  • MD5

    a493d84bf6ad957599c3004490197031

  • SHA1

    d64a4aad01b7368fd7d32afb3d1cd1b289c5f8d6

  • SHA256

    32a05f4b11e9952a0e68e9abed868efe89960173f6d57174c5b2dec5ec816e87

  • SHA512

    5ca2bfb1ba59aa17c6850f6c44bf07a0f26882e31f6fa8e836a33b328e0e5cf512af01a061400a57b4117024238369542297f44275ea1b2355bf519868d419fc

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://zxporbd.cf/admin2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a493d84bf6ad957599c3004490197031_JaffaCakes118

    • Size

      104KB

    • MD5

      a493d84bf6ad957599c3004490197031

    • SHA1

      d64a4aad01b7368fd7d32afb3d1cd1b289c5f8d6

    • SHA256

      32a05f4b11e9952a0e68e9abed868efe89960173f6d57174c5b2dec5ec816e87

    • SHA512

      5ca2bfb1ba59aa17c6850f6c44bf07a0f26882e31f6fa8e836a33b328e0e5cf512af01a061400a57b4117024238369542297f44275ea1b2355bf519868d419fc

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks