General
-
Target
43101199-98da-4e13-9aab-1aed2c063b07.xls
-
Size
1.4MB
-
Sample
221219-bard8sea39
-
MD5
c2cde165d9299f03a15c44ae27573ae9
-
SHA1
4930a00f6e1ab9dcf225dc9895e8a5f312775b3b
-
SHA256
493119c2caf898cdee17932a4f67d5944212116cf348499c4c1dcc6f6d48e5ac
-
SHA512
d64c7cf317c7d26834c6fa5ba07534bb229c4a8200f1c65716ce102692e7d7903a0b075f6cde83fdb3c1e387c7533568fe95e9dd62174ba015429efd0bf865c5
-
SSDEEP
24576:Cr5XXXXXXXXXXXXUXXXXXXXrXXXXXXXXXQmLHmTGFZIk18gFE/Y4UkgLSLcELEXT:nAoZIgPRAcAAe1
Static task
static1
Behavioral task
behavioral1
Sample
43101199-98da-4e13-9aab-1aed2c063b07.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
43101199-98da-4e13-9aab-1aed2c063b07.xls
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://sempersim.su/gm14/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
43101199-98da-4e13-9aab-1aed2c063b07.xls
-
Size
1.4MB
-
MD5
c2cde165d9299f03a15c44ae27573ae9
-
SHA1
4930a00f6e1ab9dcf225dc9895e8a5f312775b3b
-
SHA256
493119c2caf898cdee17932a4f67d5944212116cf348499c4c1dcc6f6d48e5ac
-
SHA512
d64c7cf317c7d26834c6fa5ba07534bb229c4a8200f1c65716ce102692e7d7903a0b075f6cde83fdb3c1e387c7533568fe95e9dd62174ba015429efd0bf865c5
-
SSDEEP
24576:Cr5XXXXXXXXXXXXUXXXXXXXrXXXXXXXXXQmLHmTGFZIk18gFE/Y4UkgLSLcELEXT:nAoZIgPRAcAAe1
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-