General
-
Target
SPARE PARTS Provision List.xlsx
-
Size
1.1MB
-
Sample
210721-h8tyvdw4ls
-
MD5
9659fa20cf8ef697ef1ab8327fe34bbc
-
SHA1
fa42bdf404d2a12fe5bfdad717f6c574c14e0aff
-
SHA256
741d450b9e333f111f71bb64a12d63ebdd8d5bc0bc7bb73f2acc3017a1431b60
-
SHA512
5196ec75b0387422794c953390365ee0ba361b12b3e418aca0fcd7d655d2d506a7925510e6afc3615fcf71ddfae0451132f3c6484cf54a9c9840cc53be5f39aa
Static task
static1
Behavioral task
behavioral1
Sample
SPARE PARTS Provision List.xlsx
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SPARE PARTS Provision List.xlsx
Resource
win10v20210408
Malware Config
Extracted
lokibot
http://manvim.co/fd5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SPARE PARTS Provision List.xlsx
-
Size
1.1MB
-
MD5
9659fa20cf8ef697ef1ab8327fe34bbc
-
SHA1
fa42bdf404d2a12fe5bfdad717f6c574c14e0aff
-
SHA256
741d450b9e333f111f71bb64a12d63ebdd8d5bc0bc7bb73f2acc3017a1431b60
-
SHA512
5196ec75b0387422794c953390365ee0ba361b12b3e418aca0fcd7d655d2d506a7925510e6afc3615fcf71ddfae0451132f3c6484cf54a9c9840cc53be5f39aa
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-