General

  • Target

    JaffaCakes118_c8448f9cc3379dcbc504469d36446ed5

  • Size

    283KB

  • Sample

    250109-pssa5ssjhk

  • MD5

    c8448f9cc3379dcbc504469d36446ed5

  • SHA1

    55c884adf2871680e7b0a283547d6f0ee7d16585

  • SHA256

    973cf901e982219a28db36b7120f924ad2c5d79f4561eb43c7274f91f8edd454

  • SHA512

    514134281fb28b541ad516f7dcdfdc4ddcf3cd819cf0104f9fb063411db4839fc4d10795342ef79f77a4f163175e2536102d8174ad34fb96219601dcb24e72cb

  • SSDEEP

    6144:AnuM3W+L7UwfX01ylUgHvGYbGpzvFranoGKDke0wekM/gd4:guMvHxfEbshStvN9DXDekM/

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/ga13/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      JaffaCakes118_c8448f9cc3379dcbc504469d36446ed5

    • Size

      283KB

    • MD5

      c8448f9cc3379dcbc504469d36446ed5

    • SHA1

      55c884adf2871680e7b0a283547d6f0ee7d16585

    • SHA256

      973cf901e982219a28db36b7120f924ad2c5d79f4561eb43c7274f91f8edd454

    • SHA512

      514134281fb28b541ad516f7dcdfdc4ddcf3cd819cf0104f9fb063411db4839fc4d10795342ef79f77a4f163175e2536102d8174ad34fb96219601dcb24e72cb

    • SSDEEP

      6144:AnuM3W+L7UwfX01ylUgHvGYbGpzvFranoGKDke0wekM/gd4:guMvHxfEbshStvN9DXDekM/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks