General
-
Target
Payment copy.xls
-
Size
536KB
-
Sample
221107-nhscqafgfl
-
MD5
2bb06f6289571f2705992371f58c8249
-
SHA1
b7de786cc88654c5c99cbdedd63b5adb634d5ed6
-
SHA256
b33866bbebdcdc098574d2919d7b2bbeecf6053d22c596f552004deaa6f7b8b5
-
SHA512
653a52fb27007993eca80449be08c5a39e8caf65d2b9ce6dac6e905f6aae2725a0d5086a6dc0a05105141501ba199880d2938445de006dfbdcf8b6a5fa276486
-
SSDEEP
12288:TdNqrDx7XXXXXXXXXXXXUXXXXXXXrXXXXXXXXEmYQTmDTmflZdLAxTBcwY68IosZ:Or5XXXXXXXXXXXXUXXXXXXXrXXXXXXXi
Static task
static1
Behavioral task
behavioral1
Sample
Payment copy.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Payment copy.xls
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://sempersim.su/gl16/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Payment copy.xls
-
Size
536KB
-
MD5
2bb06f6289571f2705992371f58c8249
-
SHA1
b7de786cc88654c5c99cbdedd63b5adb634d5ed6
-
SHA256
b33866bbebdcdc098574d2919d7b2bbeecf6053d22c596f552004deaa6f7b8b5
-
SHA512
653a52fb27007993eca80449be08c5a39e8caf65d2b9ce6dac6e905f6aae2725a0d5086a6dc0a05105141501ba199880d2938445de006dfbdcf8b6a5fa276486
-
SSDEEP
12288:TdNqrDx7XXXXXXXXXXXXUXXXXXXXrXXXXXXXXEmYQTmDTmflZdLAxTBcwY68IosZ:Or5XXXXXXXXXXXXUXXXXXXXrXXXXXXXi
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-