General
-
Target
IN-066.doc
-
Size
8KB
-
Sample
230201-m7ebqaeh2v
-
MD5
5d7f2446eead507f0b5477d8dd8a0a3f
-
SHA1
ee29484d82ee67dfb6d221a5975264a4c0580222
-
SHA256
14d6e05410e3b374b1d63ed82c5af8aec688563d56fd59f7851467ba2ef3548d
-
SHA512
3b9a6a174da737441780c1ec42d4cc5354b43bceef5d0afffa180a5307226e7a594766ed2c0ea94f44878a81cde254870f1fff4d67c69972dea4889cba2cd5fe
-
SSDEEP
96:ymEjR7UABGk8mn1jF9/aGv+0KF6+tlwdtOklO6LP6hO8uwmewEJmmXB:YjuVk8MT/t+0KFZwdLD/8bmuH
Static task
static1
Behavioral task
behavioral1
Sample
IN-066.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
IN-066.rtf
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://185.246.220.85/davidhill/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
IN-066.doc
-
Size
8KB
-
MD5
5d7f2446eead507f0b5477d8dd8a0a3f
-
SHA1
ee29484d82ee67dfb6d221a5975264a4c0580222
-
SHA256
14d6e05410e3b374b1d63ed82c5af8aec688563d56fd59f7851467ba2ef3548d
-
SHA512
3b9a6a174da737441780c1ec42d4cc5354b43bceef5d0afffa180a5307226e7a594766ed2c0ea94f44878a81cde254870f1fff4d67c69972dea4889cba2cd5fe
-
SSDEEP
96:ymEjR7UABGk8mn1jF9/aGv+0KF6+tlwdtOklO6LP6hO8uwmewEJmmXB:YjuVk8MT/t+0KFZwdLD/8bmuH
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-