General
-
Target
tmp/fc9caf8b7fb0e8997297f4a9a462c0e284ad124c10680835aaae643926c70509.xls
-
Size
229KB
-
Sample
211201-jh4njadgd9
-
MD5
a22ae82341b83f090f0a51fb37c51a26
-
SHA1
fd550e46f26274c3934bd83e7a236e48d14c5a3d
-
SHA256
fc9caf8b7fb0e8997297f4a9a462c0e284ad124c10680835aaae643926c70509
-
SHA512
d98cbddc87b24c67340387c095b46a013eefa6aa6364921979637bde3f3afe7d103a40c9714b4c49fcadfd39687494cfe3c9fba82b11ab3d8e310a075e9f4b98
Static task
static1
Behavioral task
behavioral1
Sample
tmp/fc9caf8b7fb0e8997297f4a9a462c0e284ad124c10680835aaae643926c70509.xls
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
tmp/fc9caf8b7fb0e8997297f4a9a462c0e284ad124c10680835aaae643926c70509.xls
Resource
win10-en-20211014
Malware Config
Extracted
lokibot
http://pticallogz.xyz/oluwa/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmp/fc9caf8b7fb0e8997297f4a9a462c0e284ad124c10680835aaae643926c70509.xls
-
Size
229KB
-
MD5
a22ae82341b83f090f0a51fb37c51a26
-
SHA1
fd550e46f26274c3934bd83e7a236e48d14c5a3d
-
SHA256
fc9caf8b7fb0e8997297f4a9a462c0e284ad124c10680835aaae643926c70509
-
SHA512
d98cbddc87b24c67340387c095b46a013eefa6aa6364921979637bde3f3afe7d103a40c9714b4c49fcadfd39687494cfe3c9fba82b11ab3d8e310a075e9f4b98
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-