General
-
Target
SecuriteInfo.com.Exploit.MathType-Obfs.Gen.1535.13330.xlsx
-
Size
248KB
-
Sample
230120-ll2z8aad49
-
MD5
9315cff2ed7e63ba2731f828957424fe
-
SHA1
063b6b535513c048ad1a472373bcbf83491a73d0
-
SHA256
c087ab1e19d3868b8e99dbc4efcc104e540101d95a3d0cba45321b2733f02793
-
SHA512
77931a33a04a8ef1ee2947b297b0114ce0bb2e7f2dff1e4952e6905e5be58f1640e431696d006780c996b5cefd1fab8e5299f37240d4d1c4b634199ad16c2c24
-
SSDEEP
6144:BcBIcuhZ+RwPONXoRjDhIcp0fDlavx+W26nAS7qHtCIZOBY7ZTO7c8xaD1:Bc2ciz+77F4c
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.MathType-Obfs.Gen.1535.13330.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.MathType-Obfs.Gen.1535.13330.xls
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://171.22.30.164/zang/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SecuriteInfo.com.Exploit.MathType-Obfs.Gen.1535.13330.xlsx
-
Size
248KB
-
MD5
9315cff2ed7e63ba2731f828957424fe
-
SHA1
063b6b535513c048ad1a472373bcbf83491a73d0
-
SHA256
c087ab1e19d3868b8e99dbc4efcc104e540101d95a3d0cba45321b2733f02793
-
SHA512
77931a33a04a8ef1ee2947b297b0114ce0bb2e7f2dff1e4952e6905e5be58f1640e431696d006780c996b5cefd1fab8e5299f37240d4d1c4b634199ad16c2c24
-
SSDEEP
6144:BcBIcuhZ+RwPONXoRjDhIcp0fDlavx+W26nAS7qHtCIZOBY7ZTO7c8xaD1:Bc2ciz+77F4c
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-