General
-
Target
TT ADVISE.docx
-
Size
10KB
-
Sample
230201-nyv4jsda79
-
MD5
cf3c57e573d8825b2c398b8b187b3ecc
-
SHA1
e80a459884ec9021de7c4f6a1e0cb8e12637e6bf
-
SHA256
a2c0610976c72c78927da80bb092501ce8a6f882b6241dc0517d3fa137ab8fe5
-
SHA512
1662a45eb2bc34b9d558f97be9e05b4d8b4f9e40470d290f4be3528291d30133b1d5ad3f55e8c26c2fdbb365913c14f3032ec8af7776ca2e7594936be8c4ff29
-
SSDEEP
192:ScIMmtP5hG/b7XN+eOZO+5+5F7Jar/YEChI3wZ:SPXRE7XtOZ7wtar/YECO0
Static task
static1
Behavioral task
behavioral1
Sample
TT ADVISE.docx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
TT ADVISE.docx
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://dgdfghfjfghfghfghgfhfghfgsdgfggdfgdfgertdfgdfgdfg@3235032958/k.doc
Extracted
lokibot
https://sempersim.su/ha4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
TT ADVISE.docx
-
Size
10KB
-
MD5
cf3c57e573d8825b2c398b8b187b3ecc
-
SHA1
e80a459884ec9021de7c4f6a1e0cb8e12637e6bf
-
SHA256
a2c0610976c72c78927da80bb092501ce8a6f882b6241dc0517d3fa137ab8fe5
-
SHA512
1662a45eb2bc34b9d558f97be9e05b4d8b4f9e40470d290f4be3528291d30133b1d5ad3f55e8c26c2fdbb365913c14f3032ec8af7776ca2e7594936be8c4ff29
-
SSDEEP
192:ScIMmtP5hG/b7XN+eOZO+5+5F7Jar/YEChI3wZ:SPXRE7XtOZ7wtar/YECO0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuses OpenXML format to download file from external location
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-