General

  • Target

    a6ff120e2dd1d66190c693ba21783472_JaffaCakes118

  • Size

    813KB

  • Sample

    240613-2x1jjatgng

  • MD5

    a6ff120e2dd1d66190c693ba21783472

  • SHA1

    679f42823241d7158ba1f95c62249594fbe3a24c

  • SHA256

    48e1ef9a4aef60c7184885857fbc7ebcab2768b98d52752e7bf9ef1c041c6213

  • SHA512

    48aef4a01fc83396ad001b01ffbd0de1a6eda8972b5adbcbcb88b58571aba9a0721d58624eeca06885d70cd775f86d9b9639388ae419559523ccac878ed0099c

  • SSDEEP

    12288:4SD2f2zcrbIUFQKlh+dcw0teENMOlFFrikd63itFtpuFDIr:vCTrbIUFQKljrtJNMODBiZ3YFtKUr

Malware Config

Extracted

Family

lokibot

C2

http://check-your-files.ga/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      a6ff120e2dd1d66190c693ba21783472_JaffaCakes118

    • Size

      813KB

    • MD5

      a6ff120e2dd1d66190c693ba21783472

    • SHA1

      679f42823241d7158ba1f95c62249594fbe3a24c

    • SHA256

      48e1ef9a4aef60c7184885857fbc7ebcab2768b98d52752e7bf9ef1c041c6213

    • SHA512

      48aef4a01fc83396ad001b01ffbd0de1a6eda8972b5adbcbcb88b58571aba9a0721d58624eeca06885d70cd775f86d9b9639388ae419559523ccac878ed0099c

    • SSDEEP

      12288:4SD2f2zcrbIUFQKlh+dcw0teENMOlFFrikd63itFtpuFDIr:vCTrbIUFQKljrtJNMODBiZ3YFtKUr

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks