General
-
Target
attachment.action
-
Size
29KB
-
Sample
230124-23qlhsfg4z
-
MD5
1197511565a3205683e8b670e09c5522
-
SHA1
6755a21726763347299f6ec0d545460b71c779c9
-
SHA256
80c28ca3134acd26d2f0181fe9866129103a3ea94e49929442506d404aced261
-
SHA512
77e9c616b4a6abbfecafb60b591f0f18b82a7dc738bdb7dce050df1ddf643e1aad7c6af3981996eedbbdec1d1ba6ffe2a5ae5a50947bd30885c15d5efb4db5fd
-
SSDEEP
768:IFx0XaIsnPRIa4fwJMKeP5chQrEieJB6i1yzLOeiSgapgH:If0Xvx3EMK/0feJBQzaePgOgH
Static task
static1
Behavioral task
behavioral1
Sample
attachment.rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
attachment.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://171.22.30.147/kelly/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
attachment.action
-
Size
29KB
-
MD5
1197511565a3205683e8b670e09c5522
-
SHA1
6755a21726763347299f6ec0d545460b71c779c9
-
SHA256
80c28ca3134acd26d2f0181fe9866129103a3ea94e49929442506d404aced261
-
SHA512
77e9c616b4a6abbfecafb60b591f0f18b82a7dc738bdb7dce050df1ddf643e1aad7c6af3981996eedbbdec1d1ba6ffe2a5ae5a50947bd30885c15d5efb4db5fd
-
SSDEEP
768:IFx0XaIsnPRIa4fwJMKeP5chQrEieJB6i1yzLOeiSgapgH:If0Xvx3EMK/0feJBQzaePgOgH
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-