General
-
Target
3.xls
-
Size
814KB
-
Sample
230118-sdhd6sbd35
-
MD5
1a44d5eb94667aa4e174a0bda3c9be56
-
SHA1
1e695c754c7ca9b8cfd3d9b9522a1aaa76e4088e
-
SHA256
3d0030f9d942a54a2de3a66d59bccd0d2fb5ce872f285b04c710eaddbf0a07ca
-
SHA512
a2bea88fd3039bba0323e24540e5514404a4331f436685c8e1af77b8734fa749139a0d6485e24d0dae71e5fc8d6a17e155101b8bfa044e01433c8dc54e749dde
-
SSDEEP
12288:sZj02NM0ry+1VF4FVF3FNFMF7B9BiBnBoFNFTFNFxFSFkBuB4BJBmuQ+UA51WvS5:ZZy/+rVzqhzpzPov+UA3gS5
Static task
static1
Behavioral task
behavioral1
Sample
3.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3.xls
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://171.22.30.147/line/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3.xls
-
Size
814KB
-
MD5
1a44d5eb94667aa4e174a0bda3c9be56
-
SHA1
1e695c754c7ca9b8cfd3d9b9522a1aaa76e4088e
-
SHA256
3d0030f9d942a54a2de3a66d59bccd0d2fb5ce872f285b04c710eaddbf0a07ca
-
SHA512
a2bea88fd3039bba0323e24540e5514404a4331f436685c8e1af77b8734fa749139a0d6485e24d0dae71e5fc8d6a17e155101b8bfa044e01433c8dc54e749dde
-
SSDEEP
12288:sZj02NM0ry+1VF4FVF3FNFMF7B9BiBnBoFNFTFNFxFSFkBuB4BJBmuQ+UA51WvS5:ZZy/+rVzqhzpzPov+UA3gS5
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-