General

  • Target

    f2fa58a6c29e501af7448637bb0bc380_JaffaCakes118

  • Size

    104KB

  • Sample

    240923-yazf6syfjk

  • MD5

    f2fa58a6c29e501af7448637bb0bc380

  • SHA1

    66503daa6d45fd09709bde7e3d4889acd6e49108

  • SHA256

    7eba58a5216c9e30048fed706efcc09e23724ffac1cceb4f0dd386fb8cb8fbfa

  • SHA512

    b11346fe71147bb731cf64b53c5291f3333fd4c91a7296bdccdb12ca3264fa05201f5f1202c645747a8f4873274ce2831dc151019caeef96196c659558e869c4

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://seacrafts.ru/garuba/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f2fa58a6c29e501af7448637bb0bc380_JaffaCakes118

    • Size

      104KB

    • MD5

      f2fa58a6c29e501af7448637bb0bc380

    • SHA1

      66503daa6d45fd09709bde7e3d4889acd6e49108

    • SHA256

      7eba58a5216c9e30048fed706efcc09e23724ffac1cceb4f0dd386fb8cb8fbfa

    • SHA512

      b11346fe71147bb731cf64b53c5291f3333fd4c91a7296bdccdb12ca3264fa05201f5f1202c645747a8f4873274ce2831dc151019caeef96196c659558e869c4

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks