General
-
Target
200ACC7F2C682A11762CD66158F15AAFA2143F3AEECF62D1152CC4FDE6224BAD
-
Size
26KB
-
Sample
221123-r1p7vsaa46
-
MD5
962cffd99bdc793a4be372de2846e36d
-
SHA1
655878671708ee824f00daa033f9b274e9c66cb5
-
SHA256
200acc7f2c682a11762cd66158f15aafa2143f3aeecf62d1152cc4fde6224bad
-
SHA512
b699e0d4a35eaac43538803a1f871f82303e422c0e4da9198aaf151fd88d80043d9a64703be1a3fbc96d5090d38e660659f8f1d51eddf748793bd6227400dc16
-
SSDEEP
768:CFx0XaIsnPRIa4fwJM+vJczdKJxMtZzHbfYn1zR5pVbjA:Cf0Xvx3EM+v2KezHb6j5pW
Static task
static1
Behavioral task
behavioral1
Sample
200ACC7F2C682A11762CD66158F15AAFA2143F3AEECF62D1152CC4FDE6224BAD.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
200ACC7F2C682A11762CD66158F15AAFA2143F3AEECF62D1152CC4FDE6224BAD.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://208.67.105.148/victor/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
200ACC7F2C682A11762CD66158F15AAFA2143F3AEECF62D1152CC4FDE6224BAD
-
Size
26KB
-
MD5
962cffd99bdc793a4be372de2846e36d
-
SHA1
655878671708ee824f00daa033f9b274e9c66cb5
-
SHA256
200acc7f2c682a11762cd66158f15aafa2143f3aeecf62d1152cc4fde6224bad
-
SHA512
b699e0d4a35eaac43538803a1f871f82303e422c0e4da9198aaf151fd88d80043d9a64703be1a3fbc96d5090d38e660659f8f1d51eddf748793bd6227400dc16
-
SSDEEP
768:CFx0XaIsnPRIa4fwJM+vJczdKJxMtZzHbfYn1zR5pVbjA:Cf0Xvx3EM+v2KezHb6j5pW
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-