General

  • Target

    bc752e3f2e651eaabb1728a5220f05da_JaffaCakes118

  • Size

    671KB

  • Sample

    240618-ry87ysxgpc

  • MD5

    bc752e3f2e651eaabb1728a5220f05da

  • SHA1

    589313ce9d328355473028a07b98aacfd771a7ae

  • SHA256

    d73dd40304c55bfe5ad9baa00bc54b362816dcfce4b807d99b4b0d951c9113eb

  • SHA512

    6d527d09dedf620893b3dfab5b8455f5c6fdbee820c1ff31502fbb911a8e54edf5643bf1c18c3836332c7a2e492324b530c70b94e9664d9e9cf5863a6f45ba3d

  • SSDEEP

    12288:EhT+VkIzcrh6H+jL1RfTS3juYVigZZ6igYc99gPAF9RfAMUYFMErxF2R/:EhOP+jh9TS3juYVbYiAgPAFxUKkR/

Malware Config

Extracted

Family

lokibot

C2

http://37.72.168.228/dusk/hond/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      bc752e3f2e651eaabb1728a5220f05da_JaffaCakes118

    • Size

      671KB

    • MD5

      bc752e3f2e651eaabb1728a5220f05da

    • SHA1

      589313ce9d328355473028a07b98aacfd771a7ae

    • SHA256

      d73dd40304c55bfe5ad9baa00bc54b362816dcfce4b807d99b4b0d951c9113eb

    • SHA512

      6d527d09dedf620893b3dfab5b8455f5c6fdbee820c1ff31502fbb911a8e54edf5643bf1c18c3836332c7a2e492324b530c70b94e9664d9e9cf5863a6f45ba3d

    • SSDEEP

      12288:EhT+VkIzcrh6H+jL1RfTS3juYVigZZ6igYc99gPAF9RfAMUYFMErxF2R/:EhOP+jh9TS3juYVbYiAgPAFxUKkR/

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks