General
-
Target
Shipping document EXP4052 MAERSK AMAZON.xls
-
Size
179KB
-
Sample
230120-yd39jahf22
-
MD5
3624d3c88fb16885c58cb4be303a54ee
-
SHA1
cad95da7ce88a90c77c23970c587c873c9ae0d4c
-
SHA256
3a1d7aaae74c5112c684b9c10390f922cf52ba8df28c4cf71206e7fb373c3de3
-
SHA512
bacdf21154cb34fac8d0185f9d8ad361183991c51bf5b1ed8e5f6c9f36ccff4bd995bec2008506433e69b8caa32651aed7e77fbe2eda73659905684e4cd19005
-
SSDEEP
3072:Kt9hcuh4t9hcNrhGTDfZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAADB+5IeW0iT2fB:IcuhicNNGXZ+RwPONXoRjDhIcp0fDlaO
Behavioral task
behavioral1
Sample
Shipping document EXP4052 MAERSK AMAZON.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Shipping document EXP4052 MAERSK AMAZON.xls
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://171.22.30.147/line/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Shipping document EXP4052 MAERSK AMAZON.xls
-
Size
179KB
-
MD5
3624d3c88fb16885c58cb4be303a54ee
-
SHA1
cad95da7ce88a90c77c23970c587c873c9ae0d4c
-
SHA256
3a1d7aaae74c5112c684b9c10390f922cf52ba8df28c4cf71206e7fb373c3de3
-
SHA512
bacdf21154cb34fac8d0185f9d8ad361183991c51bf5b1ed8e5f6c9f36ccff4bd995bec2008506433e69b8caa32651aed7e77fbe2eda73659905684e4cd19005
-
SSDEEP
3072:Kt9hcuh4t9hcNrhGTDfZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAADB+5IeW0iT2fB:IcuhicNNGXZ+RwPONXoRjDhIcp0fDlaO
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-