General
-
Target
b026474cd90b216f46158a276b4d11b33a84667780202033af851848360f60a3
-
Size
666KB
-
Sample
220701-gl3vasegdk
-
MD5
0a677370cc14bf3db9823dcd738dd0c2
-
SHA1
0588dec65e9d11d5836ede52c9563e00d9ea63c8
-
SHA256
b026474cd90b216f46158a276b4d11b33a84667780202033af851848360f60a3
-
SHA512
3264442246ea0d3dc19d26aa78c88265d6eadb90ae029385093d363f70dac3cd6fadf6f023f70cfa4cd8a803589e15ec221887f75a9fe7c008320a77768bbca1
Static task
static1
Behavioral task
behavioral1
Sample
b026474cd90b216f46158a276b4d11b33a84667780202033af851848360f60a3.rtf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b026474cd90b216f46158a276b4d11b33a84667780202033af851848360f60a3.rtf
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://privtotal.xyz/~zadmin/lmark/jojo/link.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b026474cd90b216f46158a276b4d11b33a84667780202033af851848360f60a3
-
Size
666KB
-
MD5
0a677370cc14bf3db9823dcd738dd0c2
-
SHA1
0588dec65e9d11d5836ede52c9563e00d9ea63c8
-
SHA256
b026474cd90b216f46158a276b4d11b33a84667780202033af851848360f60a3
-
SHA512
3264442246ea0d3dc19d26aa78c88265d6eadb90ae029385093d363f70dac3cd6fadf6f023f70cfa4cd8a803589e15ec221887f75a9fe7c008320a77768bbca1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-