General
-
Target
0d1562b3f8f1bcaf3252e4afec9416d2
-
Size
173KB
-
Sample
220908-xydzpscebj
-
MD5
0d1562b3f8f1bcaf3252e4afec9416d2
-
SHA1
d2e402e7d4c2bf5500972246142b4710ce1af95c
-
SHA256
d9c688aaded5e2cb5e044fa9f510483a0211555ca8ffde516eed837fe42fad62
-
SHA512
bc100de2c8682978d979fd2397c41992d88ec207da5dd75a92302560d86d1370ec3dd4b4e48291789fe4df7148ca3e85c90f1f8581f7c5912a430e90fd6dd0ca
-
SSDEEP
3072:PP5AxKSjH6zAgdQ1l8YgI488MDi9TKmvoj8d8P58NhmxMUBfm:PPsKeH6zlWOYgrM+9fv3uPaNsMUA
Static task
static1
Behavioral task
behavioral1
Sample
HBL#SFSLDTG004-22 LCL CONTAINER.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HBL#SFSLDTG004-22 LCL CONTAINER.xlsx
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://208.67.105.162/cloud2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
HBL#SFSLDTG004-22 LCL CONTAINER.xlsx
-
Size
100KB
-
MD5
4a58e87883bdb81773a0ba002bf1e255
-
SHA1
a1832b0b19d0fe264d1f3809551388dd6e881388
-
SHA256
d4572ecacc6c6f619b0b457438d91251345f6070e031ad5aca2ea910756f03b1
-
SHA512
3cb4f33e4a884ecfe791289401d6e0d4bef5ee80331ad59fc00623ade1a96fd61cbd2d59a5ad92c4a00699a671c46b6880cfb4c8b3c7bfa2ca2a6a97bba8b913
-
SSDEEP
1536:6jJPcbzCXXta/cRGGuDaCdE4M0qh5LcP9jg7Eb52Pg8IGnXvNS4GvTttuFybpD9U:6jJkbUtDKvKh/PLcFkJp/iGFPX
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-