General

  • Target

    JaffaCakes118_6e3c82c82fb2fcf38123d93c0d6b93b2

  • Size

    259KB

  • Sample

    250103-vx3kkaxpal

  • MD5

    6e3c82c82fb2fcf38123d93c0d6b93b2

  • SHA1

    df87c816ea5edb6b8c763fb133ca0e52840d944b

  • SHA256

    77fd63dabf73eb44f7c9830553740ea290cac78bc333322326c70b927a69d4fe

  • SHA512

    3dd2b8a798dc1506ea6a44dbc620e2df93336e3fd450f5e5405c125fe0aab9ba2e2d3de4ec7ab89826f58d7c19586ace247a117e7b15c66821a66509e1aa4837

  • SSDEEP

    6144:uceVoLVEb4uqb5iKxkMGxArlx6Q47dtsxqX7tNfVXVHQLIiu8c:uce6VEb4xNxkMEArlxyTsxwZGEX8c

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/ga14/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_6e3c82c82fb2fcf38123d93c0d6b93b2

    • Size

      259KB

    • MD5

      6e3c82c82fb2fcf38123d93c0d6b93b2

    • SHA1

      df87c816ea5edb6b8c763fb133ca0e52840d944b

    • SHA256

      77fd63dabf73eb44f7c9830553740ea290cac78bc333322326c70b927a69d4fe

    • SHA512

      3dd2b8a798dc1506ea6a44dbc620e2df93336e3fd450f5e5405c125fe0aab9ba2e2d3de4ec7ab89826f58d7c19586ace247a117e7b15c66821a66509e1aa4837

    • SSDEEP

      6144:uceVoLVEb4uqb5iKxkMGxArlx6Q47dtsxqX7tNfVXVHQLIiu8c:uce6VEb4xNxkMEArlxyTsxwZGEX8c

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks