General
-
Target
2.docx
-
Size
10KB
-
Sample
230202-nscd9aga33
-
MD5
964435a9422be8e9212752151d6e2045
-
SHA1
7bf1fa0295f31caca8f93b986e1980764695683b
-
SHA256
b9cd7f34e5260b2002c3b3514c8756e4f211fa5a8cdad2c107b90131996605e7
-
SHA512
86e8e259e4244210201502a0da6e7bacd730b9e92f21dc2ab07328a4148bcf9af383610aac0089e431558efe5e7dc32d3775aebdb6a9d509a35dab06f930a2ee
-
SSDEEP
192:ScIMmtP5hG/b7XN+eOUeO+5+5F7Jar/YEChI3uN:SPXRE7XtOUe7wtar/YECO+
Static task
static1
Behavioral task
behavioral1
Sample
2.docx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2.docx
Resource
win10v2004-20221111-en
Malware Config
Extracted
http://dgd0000fghfjf000ghf0000hfghgfhf0000ghfgsdgfgg00000dfgdfgert0000000dfgdfgdfg@3235032958/3.doc
Extracted
lokibot
https://sempersim.su/ha4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2.docx
-
Size
10KB
-
MD5
964435a9422be8e9212752151d6e2045
-
SHA1
7bf1fa0295f31caca8f93b986e1980764695683b
-
SHA256
b9cd7f34e5260b2002c3b3514c8756e4f211fa5a8cdad2c107b90131996605e7
-
SHA512
86e8e259e4244210201502a0da6e7bacd730b9e92f21dc2ab07328a4148bcf9af383610aac0089e431558efe5e7dc32d3775aebdb6a9d509a35dab06f930a2ee
-
SSDEEP
192:ScIMmtP5hG/b7XN+eOUeO+5+5F7Jar/YEChI3uN:SPXRE7XtOUe7wtar/YECO+
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuses OpenXML format to download file from external location
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation