General

  • Target

    JaffaCakes118_330613d5721a15d2651601e5e210c678

  • Size

    344KB

  • Sample

    250106-wv1tmatlez

  • MD5

    330613d5721a15d2651601e5e210c678

  • SHA1

    c66d23565c4308c5902e5b04cc7c4a014acaae42

  • SHA256

    0fa8577fe39341b7a5ee9c4fcb1e1b1cdef037fe71fcda4b03da5317f86b41d7

  • SHA512

    554aad17ada16698733e83814142c6422eeb66ecbf522e41754db8ae0d416ffb37c9731e08182c91596371edbc97dc7cb5fda2b0dbe88a64eeec4114f848bb1a

  • SSDEEP

    6144:GfBdf0g1zuV0S/PChACRMTMMLVr6xgmmuYUdXu+4W2jDF/4cQpmhdlt:Gpdf0g1z7MChACRUdNKmuYUdXu+CjDFo

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/ga13/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_330613d5721a15d2651601e5e210c678

    • Size

      344KB

    • MD5

      330613d5721a15d2651601e5e210c678

    • SHA1

      c66d23565c4308c5902e5b04cc7c4a014acaae42

    • SHA256

      0fa8577fe39341b7a5ee9c4fcb1e1b1cdef037fe71fcda4b03da5317f86b41d7

    • SHA512

      554aad17ada16698733e83814142c6422eeb66ecbf522e41754db8ae0d416ffb37c9731e08182c91596371edbc97dc7cb5fda2b0dbe88a64eeec4114f848bb1a

    • SSDEEP

      6144:GfBdf0g1zuV0S/PChACRMTMMLVr6xgmmuYUdXu+4W2jDF/4cQpmhdlt:Gpdf0g1z7MChACRUdNKmuYUdXu+CjDFo

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks