General
-
Target
swift copy.xls
-
Size
1.0MB
-
Sample
221125-hzzkgaab57
-
MD5
b7a1c1235321ffac30bd93e68e6b05fa
-
SHA1
d3465699ad750e86448ab9bfc7fa991ec11202f4
-
SHA256
d8434c7afbabf1d54dc2552defb21ec3c084169b9ad9db801c230e5b1a512a8b
-
SHA512
85c289e43c32f0ac1e68430d26d2540c4ffb18a4d01efff2c31a6a3b0584be09bfb6a0f315c0bf501d38ba4afe167e60afe92f0ef586822e70a83c562d1610fb
-
SSDEEP
24576:pr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXYmRr5XXXXXXXXXXXXUXXXXXXXSXXXXXj:nWyd
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
swift copy.xls
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://sempersim.su/gm13/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
swift copy.xls
-
Size
1.0MB
-
MD5
b7a1c1235321ffac30bd93e68e6b05fa
-
SHA1
d3465699ad750e86448ab9bfc7fa991ec11202f4
-
SHA256
d8434c7afbabf1d54dc2552defb21ec3c084169b9ad9db801c230e5b1a512a8b
-
SHA512
85c289e43c32f0ac1e68430d26d2540c4ffb18a4d01efff2c31a6a3b0584be09bfb6a0f315c0bf501d38ba4afe167e60afe92f0ef586822e70a83c562d1610fb
-
SSDEEP
24576:pr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXYmRr5XXXXXXXXXXXXUXXXXXXXSXXXXXj:nWyd
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-