General

  • Target

    2455eb456e8ef7f9967a27086396308f_JaffaCakes118

  • Size

    494KB

  • Sample

    240704-c1ad3ssakf

  • MD5

    2455eb456e8ef7f9967a27086396308f

  • SHA1

    641d1e46d1becbf14bb20820fab272121a589639

  • SHA256

    6cf5b115c1a092a4c263438ab5170c2aa9ad49dfa37f363568e6d0e0d7bb6b05

  • SHA512

    db0646789b3676ff56a5ada94ecd21732307e24abf53bf848a3aedb790eb2c8cb6ac67084eff9af0228530170283a44c0a0734a239288fbab2e7305a0a479b09

  • SSDEEP

    12288:o+oxHFY1eX5SO7OzTSJT6YashlM0JT6YashlM:XGFNSOAS9ashlV9ashl

Malware Config

Extracted

Family

lokibot

C2

http://136.243.159.53/~element/page.php?id=495

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2455eb456e8ef7f9967a27086396308f_JaffaCakes118

    • Size

      494KB

    • MD5

      2455eb456e8ef7f9967a27086396308f

    • SHA1

      641d1e46d1becbf14bb20820fab272121a589639

    • SHA256

      6cf5b115c1a092a4c263438ab5170c2aa9ad49dfa37f363568e6d0e0d7bb6b05

    • SHA512

      db0646789b3676ff56a5ada94ecd21732307e24abf53bf848a3aedb790eb2c8cb6ac67084eff9af0228530170283a44c0a0734a239288fbab2e7305a0a479b09

    • SSDEEP

      12288:o+oxHFY1eX5SO7OzTSJT6YashlM0JT6YashlM:XGFNSOAS9ashlV9ashl

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks