General
-
Target
Sales Contract-204 -DWI INDAH.xls
-
Size
710KB
-
Sample
230113-gdjfpaef25
-
MD5
85479a0eddcf64c752682cdf8d0c4f14
-
SHA1
9f4949871b0670b96cd3dc8fa697da77f300eb5f
-
SHA256
e3aaf36fee656a3135e01c1f9efb366a5449fb3e1dc0f1e1d1ced9d17a53d4ca
-
SHA512
1f6c0d6426765ab399f00d8dd8cb05548b1822d4f2725a821dee333145e5888b21ec73f6dd209a8ec7384593674364618051147bd30820fed1cec6a4c698d89c
-
SSDEEP
12288:UP02NM0ry+1ov02NM0ry+1YqkhDkwJ1Wrh:9ZyBZyA9kwHEh
Static task
static1
Behavioral task
behavioral1
Sample
Sales Contract-204 -DWI INDAH.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Sales Contract-204 -DWI INDAH.xls
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://208.67.105.148/fresh2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Sales Contract-204 -DWI INDAH.xls
-
Size
710KB
-
MD5
85479a0eddcf64c752682cdf8d0c4f14
-
SHA1
9f4949871b0670b96cd3dc8fa697da77f300eb5f
-
SHA256
e3aaf36fee656a3135e01c1f9efb366a5449fb3e1dc0f1e1d1ced9d17a53d4ca
-
SHA512
1f6c0d6426765ab399f00d8dd8cb05548b1822d4f2725a821dee333145e5888b21ec73f6dd209a8ec7384593674364618051147bd30820fed1cec6a4c698d89c
-
SSDEEP
12288:UP02NM0ry+1ov02NM0ry+1YqkhDkwJ1Wrh:9ZyBZyA9kwHEh
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-