General

  • Target

    1489cae273b50f220bac06fe25b070a6_JaffaCakes118

  • Size

    279KB

  • Sample

    240627-d5pj8staql

  • MD5

    1489cae273b50f220bac06fe25b070a6

  • SHA1

    fc330ff77a46bc464331d74509270b9c0f8fc48b

  • SHA256

    9f36944a8830046942b6f798ba00cd7936ad0cedddaa22236c6691b329e044b8

  • SHA512

    155669ff6a5aec3d43361141be5e904cc925d979fdec8b03f8955e04daea54cec3b2651c1f1c0ce922cd61753d1e84adb5f615ad79a91ade7be5c993c3ff2b5f

  • SSDEEP

    6144:mJzsULX+XXEgSibCUtmbXWfp88iSGNaROhxxpeTr/ekI:qzraXXEqAbClwPzxp6L

Malware Config

Extracted

Family

lokibot

C2

http://arku.xyz/ezeigbo/w2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      1489cae273b50f220bac06fe25b070a6_JaffaCakes118

    • Size

      279KB

    • MD5

      1489cae273b50f220bac06fe25b070a6

    • SHA1

      fc330ff77a46bc464331d74509270b9c0f8fc48b

    • SHA256

      9f36944a8830046942b6f798ba00cd7936ad0cedddaa22236c6691b329e044b8

    • SHA512

      155669ff6a5aec3d43361141be5e904cc925d979fdec8b03f8955e04daea54cec3b2651c1f1c0ce922cd61753d1e84adb5f615ad79a91ade7be5c993c3ff2b5f

    • SSDEEP

      6144:mJzsULX+XXEgSibCUtmbXWfp88iSGNaROhxxpeTr/ekI:qzraXXEqAbClwPzxp6L

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks