General
-
Target
MT103 Swift output.doc
-
Size
27KB
-
Sample
221125-g38rwabd5v
-
MD5
8a87321a096ef3926c626e44fc58fb4c
-
SHA1
9bec3b1a0fcb3369d9635351455afc944a5d0530
-
SHA256
caaac2649b57e658e83daff19e510575c9a53b8fc91dd55aefd278191d00f2dc
-
SHA512
179e75701ed999fb92ea3d66d0cff2f3d3f825e77a3d351646d29707cefeb794fb13848037426aabfa3b3bf5a8a823f358f88b0ab43fd6f6a357b5bf03542cae
-
SSDEEP
768:cFx0XaIsnPRIa4fwJMB5VD55pToHsKaGPEtdI:cf0Xvx3EMXT5p1KnPidI
Static task
static1
Behavioral task
behavioral1
Sample
MT103 Swift output.rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
MT103 Swift output.rtf
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://171.22.30.164/kelly/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
MT103 Swift output.doc
-
Size
27KB
-
MD5
8a87321a096ef3926c626e44fc58fb4c
-
SHA1
9bec3b1a0fcb3369d9635351455afc944a5d0530
-
SHA256
caaac2649b57e658e83daff19e510575c9a53b8fc91dd55aefd278191d00f2dc
-
SHA512
179e75701ed999fb92ea3d66d0cff2f3d3f825e77a3d351646d29707cefeb794fb13848037426aabfa3b3bf5a8a823f358f88b0ab43fd6f6a357b5bf03542cae
-
SSDEEP
768:cFx0XaIsnPRIa4fwJMB5VD55pToHsKaGPEtdI:cf0Xvx3EMXT5p1KnPidI
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-