General
-
Target
shipping doc.xls
-
Size
1.6MB
-
Sample
230126-jld72sed7v
-
MD5
9281a044182796eb8cb475c9d848b22c
-
SHA1
f022f15ecb7d248b643db4bd69137abbbfd1d135
-
SHA256
3076cb6e292d99f4a945ef56d63ce7b234215177fe8fae47b1811fc5503fc2dd
-
SHA512
0a4613195ba29268eff93094349637a7d75c1aed7232d982c1d2f7704ff5171a3ae9c49ae169f1df5858be16a9071191182bf915e21037a73bec4ed9fd81aaf4
-
SSDEEP
49152:ND+O/J9ED+O/J9HD+O/J91D+O/J9ExZRUhd6iPBUkilVh/:NDpxODpxBDpxPDpxixfCd/PBUFbp
Behavioral task
behavioral1
Sample
shipping doc.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
shipping doc.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://171.22.30.164/zang/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
shipping doc.xls
-
Size
1.6MB
-
MD5
9281a044182796eb8cb475c9d848b22c
-
SHA1
f022f15ecb7d248b643db4bd69137abbbfd1d135
-
SHA256
3076cb6e292d99f4a945ef56d63ce7b234215177fe8fae47b1811fc5503fc2dd
-
SHA512
0a4613195ba29268eff93094349637a7d75c1aed7232d982c1d2f7704ff5171a3ae9c49ae169f1df5858be16a9071191182bf915e21037a73bec4ed9fd81aaf4
-
SSDEEP
49152:ND+O/J9ED+O/J9HD+O/J91D+O/J9ExZRUhd6iPBUkilVh/:NDpxODpxBDpxPDpxixfCd/PBUFbp
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-