General

  • Target

    aa5b0f840e24aa2d35e07d56123df729_JaffaCakes118

  • Size

    104KB

  • Sample

    240614-sk5s2szcmj

  • MD5

    aa5b0f840e24aa2d35e07d56123df729

  • SHA1

    7d8f40b34372aa4c6f4cbabaa11fb7bb23d8e5a3

  • SHA256

    e05fc488f21b56a842561cb0b35ce47b39cd63352d1e633fdeb6a645903f62dd

  • SHA512

    e4ab93bea30b4a357ad3053096b0d40cb599564e962c658573f8201c27424d0fca3f11d6d352de151c27ab1c25ee44c6c99eaee23ae26c4f98dfb0355219c988

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqoIzmd:nSHIG6mQwGmfOQd8YhY0/EpUG

Malware Config

Extracted

Family

lokibot

C2

http://80.209.225.170/armani/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      aa5b0f840e24aa2d35e07d56123df729_JaffaCakes118

    • Size

      104KB

    • MD5

      aa5b0f840e24aa2d35e07d56123df729

    • SHA1

      7d8f40b34372aa4c6f4cbabaa11fb7bb23d8e5a3

    • SHA256

      e05fc488f21b56a842561cb0b35ce47b39cd63352d1e633fdeb6a645903f62dd

    • SHA512

      e4ab93bea30b4a357ad3053096b0d40cb599564e962c658573f8201c27424d0fca3f11d6d352de151c27ab1c25ee44c6c99eaee23ae26c4f98dfb0355219c988

    • SSDEEP

      1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqoIzmd:nSHIG6mQwGmfOQd8YhY0/EpUG

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks