General
-
Target
P.I 99220345.docx
-
Size
10KB
-
Sample
230116-sp11naha98
-
MD5
28d506098937d7ddaf58805011f8d45d
-
SHA1
24229cc8d80884084c1addb04c65681c9233dad0
-
SHA256
4b67a9ddf9fc9d3df0b158bdae523144c329080a0e949a71584b7339b204e5c5
-
SHA512
cf5e2af854adec3a6657e2fac63aefaa8484a30fbe78e074760bc54a00aec4046724fad6b8c03ab87e2675e6476130138582b64c722e5737d97946653c46e5ef
-
SSDEEP
192:ScIMmtP8ar5G/bfIdTOpULnamWBX8ex6y3PWFl:SPXt4ATOqLnosM+D
Static task
static1
Behavioral task
behavioral1
Sample
P.I 99220345.docx
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
P.I 99220345.docx
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://000000000000000000000000000000000000000000@392097655/_--00_o______---00o0_00-o_o0-__________o0o-__________/jpooofggjdfjghjfdggsahfhfghf.doc
Extracted
lokibot
https://sempersim.su/ha1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
P.I 99220345.docx
-
Size
10KB
-
MD5
28d506098937d7ddaf58805011f8d45d
-
SHA1
24229cc8d80884084c1addb04c65681c9233dad0
-
SHA256
4b67a9ddf9fc9d3df0b158bdae523144c329080a0e949a71584b7339b204e5c5
-
SHA512
cf5e2af854adec3a6657e2fac63aefaa8484a30fbe78e074760bc54a00aec4046724fad6b8c03ab87e2675e6476130138582b64c722e5737d97946653c46e5ef
-
SSDEEP
192:ScIMmtP8ar5G/bfIdTOpULnamWBX8ex6y3PWFl:SPXt4ATOqLnosM+D
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuses OpenXML format to download file from external location
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-