General
-
Target
PO.25.10.2022PROJECT ORDER.xlsx
-
Size
116KB
-
Sample
221010-n2axsabhdj
-
MD5
2a36ef5ac23db260390c4571c6f9a477
-
SHA1
1ed6db12fa671fe480c78b80ea19a6c703399a04
-
SHA256
19fea993b7202c3eb16c7911707330a61bb9eefc09e548fdea419b849d04c09b
-
SHA512
21290cecab613882ad25caa29eb84912ccf8441385f172f3a7b0737dac478d6b3dfdaf85fdd4da4c160fdf61a4759e3f4254da294fd06eb48f05566237806e14
-
SSDEEP
3072:Je/6zK4qlPDY74XnfSvLawwsatZBQmln5VzAH6S5A:cYMvSvcsatZBQh6S5A
Static task
static1
Behavioral task
behavioral1
Sample
PO.25.10.2022PROJECT ORDER.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO.25.10.2022PROJECT ORDER.xlsx
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://162.0.223.13/?OpqycIYJoIxPvNI7mSRvpEdWbvlzd7L2wbAJUztih08MOR
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PO.25.10.2022PROJECT ORDER.xlsx
-
Size
116KB
-
MD5
2a36ef5ac23db260390c4571c6f9a477
-
SHA1
1ed6db12fa671fe480c78b80ea19a6c703399a04
-
SHA256
19fea993b7202c3eb16c7911707330a61bb9eefc09e548fdea419b849d04c09b
-
SHA512
21290cecab613882ad25caa29eb84912ccf8441385f172f3a7b0737dac478d6b3dfdaf85fdd4da4c160fdf61a4759e3f4254da294fd06eb48f05566237806e14
-
SSDEEP
3072:Je/6zK4qlPDY74XnfSvLawwsatZBQmln5VzAH6S5A:cYMvSvcsatZBQh6S5A
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-