General
-
Target
MV DOBROTA DOCS INSTRUCTIONS.xls
-
Size
683KB
-
Sample
230206-k964eada89
-
MD5
e7fd9fc17216ee5b41867a90b6514813
-
SHA1
a91392847605ea2dd4cabbb0b18c8a4689517798
-
SHA256
36bfe471de8765f11de3ca3fce2a6a9b36d47ad8de09cc79b6648f09a653fd88
-
SHA512
06367fdcaab3ba0290b67b343498fd74576d0f3341fc04747710b3448935e087c8e64c01d9937dc9c5f1ba295bd3db2f85ba691c4802534eab9b39504a0af72d
-
SSDEEP
6144:U0rC6zzXaMANkizCBDEk2sG3figF8ESbuQD9cBmSI5Tj0rC6zzXaMANkizCBDEkq:t9L5Tb9T5TEwFSZDIlr
Static task
static1
Behavioral task
behavioral1
Sample
MV DOBROTA DOCS INSTRUCTIONS.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
MV DOBROTA DOCS INSTRUCTIONS.xls
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://171.22.30.147/line/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
MV DOBROTA DOCS INSTRUCTIONS.xls
-
Size
683KB
-
MD5
e7fd9fc17216ee5b41867a90b6514813
-
SHA1
a91392847605ea2dd4cabbb0b18c8a4689517798
-
SHA256
36bfe471de8765f11de3ca3fce2a6a9b36d47ad8de09cc79b6648f09a653fd88
-
SHA512
06367fdcaab3ba0290b67b343498fd74576d0f3341fc04747710b3448935e087c8e64c01d9937dc9c5f1ba295bd3db2f85ba691c4802534eab9b39504a0af72d
-
SSDEEP
6144:U0rC6zzXaMANkizCBDEk2sG3figF8ESbuQD9cBmSI5Tj0rC6zzXaMANkizCBDEkq:t9L5Tb9T5TEwFSZDIlr
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-