General
-
Target
SecuriteInfo.com.Exploit.MathType-Obfs.Gen.3602.23049.xlsx
-
Size
185KB
-
Sample
230120-cx1f4adc3w
-
MD5
0ec2ce77939bd3cad837bddbdd235d45
-
SHA1
c270e3388e9b099a352132280f83f35cd1415233
-
SHA256
17187faff069ea4e8a0c9f2d7bea8ac65126e2bfdd2054aa19c8c8f63fa7e007
-
SHA512
05c494083d8fc8ce21d527feaf020fa6942d2e9d5151586ad98fb181d83ea4383c58954cab961c509a052008c8f5da6a2be4e20320f19ccb5e005dda3956fa2e
-
SSDEEP
3072:Ht9hc16t9hcuK7fZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAT9TadAxrt9xFOujrHB:hc1YcuKzZ+RwPONXoRjDhIcp0fDlavxk
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.MathType-Obfs.Gen.3602.23049.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.MathType-Obfs.Gen.3602.23049.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SecuriteInfo.com.Exploit.MathType-Obfs.Gen.3602.23049.xlsx
-
Size
185KB
-
MD5
0ec2ce77939bd3cad837bddbdd235d45
-
SHA1
c270e3388e9b099a352132280f83f35cd1415233
-
SHA256
17187faff069ea4e8a0c9f2d7bea8ac65126e2bfdd2054aa19c8c8f63fa7e007
-
SHA512
05c494083d8fc8ce21d527feaf020fa6942d2e9d5151586ad98fb181d83ea4383c58954cab961c509a052008c8f5da6a2be4e20320f19ccb5e005dda3956fa2e
-
SSDEEP
3072:Ht9hc16t9hcuK7fZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAT9TadAxrt9xFOujrHB:hc1YcuKzZ+RwPONXoRjDhIcp0fDlavxk
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-