General

  • Target

    JaffaCakes118_47043f8c2028666aef46e8964a21df7d

  • Size

    284KB

  • Sample

    250107-ccveca1jdr

  • MD5

    47043f8c2028666aef46e8964a21df7d

  • SHA1

    859c5e83cbd2833024d479e6b50dd5c1ce139f1a

  • SHA256

    0ce3973ea9753623ddefa07e57ab2549971425741b7292675df1c093fffb6fc2

  • SHA512

    a900d1a86b137ee75baa7e552227d4cc22b1483136560526c2c59ea4bbc7d324b652002d627683cff38d85f81d7c49292400d6068b8568375fd54ea81041f685

  • SSDEEP

    6144:tn0rrQny760ttSGlvM5KvoDYlDpRkEH0t3vRis2f:t0HANkUwvW+Rk2S3vRi

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/ga13/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_47043f8c2028666aef46e8964a21df7d

    • Size

      284KB

    • MD5

      47043f8c2028666aef46e8964a21df7d

    • SHA1

      859c5e83cbd2833024d479e6b50dd5c1ce139f1a

    • SHA256

      0ce3973ea9753623ddefa07e57ab2549971425741b7292675df1c093fffb6fc2

    • SHA512

      a900d1a86b137ee75baa7e552227d4cc22b1483136560526c2c59ea4bbc7d324b652002d627683cff38d85f81d7c49292400d6068b8568375fd54ea81041f685

    • SSDEEP

      6144:tn0rrQny760ttSGlvM5KvoDYlDpRkEH0t3vRis2f:t0HANkUwvW+Rk2S3vRi

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks