General
-
Target
RFQ.xls
-
Size
1.0MB
-
Sample
221128-jdqk4sfb37
-
MD5
08260ba2505cbe73488e97bab13d291f
-
SHA1
0772c758f4869a6a3c43479793e2f962cfb828f3
-
SHA256
9c22aff1d30e396ef914d81ac057bac2d4d2bdb32fdd3d0ee83efec5a1fe0f2f
-
SHA512
367f08996e7ae16334a3027d678ef45b46c02b38253ef668e77f49e91a5b70b242eb7e96d4b749f1a4208f222eff84ffdaf6d042e130338e8d03f4a98d6daffd
-
SSDEEP
24576:Ar5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXompr5XXXXXXXXXXXXUXXXXXXXSXXXXX1:rJk3a2
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RFQ.xls
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://171.22.30.164/mous/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
RFQ.xls
-
Size
1.0MB
-
MD5
08260ba2505cbe73488e97bab13d291f
-
SHA1
0772c758f4869a6a3c43479793e2f962cfb828f3
-
SHA256
9c22aff1d30e396ef914d81ac057bac2d4d2bdb32fdd3d0ee83efec5a1fe0f2f
-
SHA512
367f08996e7ae16334a3027d678ef45b46c02b38253ef668e77f49e91a5b70b242eb7e96d4b749f1a4208f222eff84ffdaf6d042e130338e8d03f4a98d6daffd
-
SSDEEP
24576:Ar5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXompr5XXXXXXXXXXXXUXXXXXXXSXXXXX1:rJk3a2
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-