General
-
Target
Shipping Documents.xls
-
Size
745KB
-
Sample
221123-l8l8aagf8s
-
MD5
b26dc6733a40f5a72d8d58edc416cdc5
-
SHA1
4a1c494735e417b7229a7850513e6dac55114658
-
SHA256
240f6cbc60f5ab14cf8a1fdfc60a52deea8f5ed5c5a04c806e4ae153c7a7865f
-
SHA512
dc792b9d101449cf7e02939b7c4d1cde63641a82a7cb76dbc00312396ef634b6edbc9f6495ccd4d1e2f3267452bf4c5228cdb4232badc87cacb9f2c3349683b9
-
SSDEEP
12288:fdNqrDx7XXXXXXXXXXXXUXXXXXXXSXXXXXXXXWTmaqydNqrDx7XXXXXXXXXXXXUN:Cr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXy
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Shipping Documents.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://sempersim.su/gm14/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Shipping Documents.xls
-
Size
745KB
-
MD5
b26dc6733a40f5a72d8d58edc416cdc5
-
SHA1
4a1c494735e417b7229a7850513e6dac55114658
-
SHA256
240f6cbc60f5ab14cf8a1fdfc60a52deea8f5ed5c5a04c806e4ae153c7a7865f
-
SHA512
dc792b9d101449cf7e02939b7c4d1cde63641a82a7cb76dbc00312396ef634b6edbc9f6495ccd4d1e2f3267452bf4c5228cdb4232badc87cacb9f2c3349683b9
-
SSDEEP
12288:fdNqrDx7XXXXXXXXXXXXUXXXXXXXSXXXXXXXXWTmaqydNqrDx7XXXXXXXXXXXXUN:Cr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXy
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-