General
-
Target
Wire_Slip.xlsx
-
Size
436KB
-
Sample
211027-n736hshagp
-
MD5
6a7d68de0b2d63cd53504e3abbf46996
-
SHA1
3bff34521fa2fe85a5fd8f1000bcd5db275bb199
-
SHA256
eca1784247861d517c8d7626ef78669dcd1dc20e46fde840a45c7d26dae46886
-
SHA512
d2946250478224dad711e0e2b74beaf71a1acd4ec8a9848c3485b699ef884c46267748b575bba296757ab1557acc5e547d55b69cc7567e373f08446f38dd01fd
Static task
static1
Behavioral task
behavioral1
Sample
Wire_Slip.xlsx
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Wire_Slip.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
lokibot
http://74f26d34ffff049368a6cff8812f86ee.gq/BN111/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Wire_Slip.xlsx
-
Size
436KB
-
MD5
6a7d68de0b2d63cd53504e3abbf46996
-
SHA1
3bff34521fa2fe85a5fd8f1000bcd5db275bb199
-
SHA256
eca1784247861d517c8d7626ef78669dcd1dc20e46fde840a45c7d26dae46886
-
SHA512
d2946250478224dad711e0e2b74beaf71a1acd4ec8a9848c3485b699ef884c46267748b575bba296757ab1557acc5e547d55b69cc7567e373f08446f38dd01fd
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-