General

  • Target

    f362c2f2d8999c5363110737094dfe54_JaffaCakes118

  • Size

    104KB

  • Sample

    240924-l1brkszfpl

  • MD5

    f362c2f2d8999c5363110737094dfe54

  • SHA1

    980829d1480a2a04b68d849b70e0ac93ec76562d

  • SHA256

    b8e1fdc66464e3a4b61551afd2f96d4102ec03f5527f6a631c7d7541e09eb390

  • SHA512

    77c63e0df4f7ce5a24c15242a2c3d0b82f4f3c0007ccb175dbeebe01f043be402080b26de2c1cc3cc0e42700be55b320cfdfb39a46c56be6ee7a1915ce159d35

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Malware Config

Extracted

Family

lokibot

C2

http://ametradeinc.ga/space/Panel2.0/Rac/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      f362c2f2d8999c5363110737094dfe54_JaffaCakes118

    • Size

      104KB

    • MD5

      f362c2f2d8999c5363110737094dfe54

    • SHA1

      980829d1480a2a04b68d849b70e0ac93ec76562d

    • SHA256

      b8e1fdc66464e3a4b61551afd2f96d4102ec03f5527f6a631c7d7541e09eb390

    • SHA512

      77c63e0df4f7ce5a24c15242a2c3d0b82f4f3c0007ccb175dbeebe01f043be402080b26de2c1cc3cc0e42700be55b320cfdfb39a46c56be6ee7a1915ce159d35

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks