General
-
Target
Statement Of Account .xls
-
Size
883KB
-
Sample
230118-q89e2aac62
-
MD5
7b35fd3ea67e7ab049ba760c0bbf03e7
-
SHA1
e0e3665311627b00580f3ff72c502e6e3779afd2
-
SHA256
2fe07388d4fb59ade682b9553b4fee971d77a18018cbe7af052d880c2211c559
-
SHA512
bdd45fb16e63d5eca8e957a057e272abddcc0be5326f729c6c260617f1a6128d5dd085625e35f59eef6bb681feb1eabb7ad564409c2a55ced7db3ebc455ce0b2
-
SSDEEP
12288:Us02NM0ry+1wFZBDF4BSFLBJFKBsx02NM0ry+1ZFTBHFxBaFJBiFBBnuoSIAB1WP:KZy6Z9lsZyrX4ILSIAvQv
Static task
static1
Behavioral task
behavioral1
Sample
Statement Of Account .xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Statement Of Account .xls
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Statement Of Account .xls
-
Size
883KB
-
MD5
7b35fd3ea67e7ab049ba760c0bbf03e7
-
SHA1
e0e3665311627b00580f3ff72c502e6e3779afd2
-
SHA256
2fe07388d4fb59ade682b9553b4fee971d77a18018cbe7af052d880c2211c559
-
SHA512
bdd45fb16e63d5eca8e957a057e272abddcc0be5326f729c6c260617f1a6128d5dd085625e35f59eef6bb681feb1eabb7ad564409c2a55ced7db3ebc455ce0b2
-
SSDEEP
12288:Us02NM0ry+1wFZBDF4BSFLBJFKBsx02NM0ry+1ZFTBHFxBaFJBiFBBnuoSIAB1WP:KZy6Z9lsZyrX4ILSIAvQv
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-