General
-
Target
New Order.doc
-
Size
358KB
-
Sample
221028-nzlaqsfdf5
-
MD5
10215dddffc086202b23f3069eb14a1c
-
SHA1
a93ef33d7b7aef8b2e4296e6644922dc96393e70
-
SHA256
8d3ead1a4149580c6019ff682e2e77c40391cb01799aec3d25f1c7e6d369517e
-
SHA512
0985b5858760a6fe6633cce9ac97143ceea82967f4b8bb9ddf60d5455344871447117cb2be2e24508776a9ef0e65a35fd35b8d58741c509e39cf6a10223b0cc8
-
SSDEEP
384:OLJshTShevdvGyuRx6KI8y9d+v1ZsPWWJZ:mJshmhevAyMx6YZaZ
Static task
static1
Behavioral task
behavioral1
Sample
New Order.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
New Order.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://208.67.105.161/wealth/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
New Order.doc
-
Size
358KB
-
MD5
10215dddffc086202b23f3069eb14a1c
-
SHA1
a93ef33d7b7aef8b2e4296e6644922dc96393e70
-
SHA256
8d3ead1a4149580c6019ff682e2e77c40391cb01799aec3d25f1c7e6d369517e
-
SHA512
0985b5858760a6fe6633cce9ac97143ceea82967f4b8bb9ddf60d5455344871447117cb2be2e24508776a9ef0e65a35fd35b8d58741c509e39cf6a10223b0cc8
-
SSDEEP
384:OLJshTShevdvGyuRx6KI8y9d+v1ZsPWWJZ:mJshmhevAyMx6YZaZ
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-