General
-
Target
39768453c17afce045164d39f94da00f2e7278130702d41812924bd9c2c3a82a.zip
-
Size
18KB
-
Sample
230208-ly58eaab42
-
MD5
971bb78630222138b4f8fee8f26ffde0
-
SHA1
6f748a01fb375c48f3bb87a7657944a0494df862
-
SHA256
fffd252dab3db06f226727d593a496dd82b73d4b6312f845eff32e16be7fb48b
-
SHA512
97239d2f642d66a6a2e27f0212a5457cfcb205e9784e3e22d06be6920d0e244bdadc76cb6c7a26b3745391a2c9ef65ce37d8a9ac71be6ae0a0a948ab9a64e71f
-
SSDEEP
384:VZxw7oSJQS6ouTAH9A4L1IPRRd4kmTO43Ck5Hk/He2p5aIg:VaQS6RKzJI5mTO43H5Hk/lp5Zg
Static task
static1
Behavioral task
behavioral1
Sample
39768453c17afce045164d39f94da00f2e7278130702d41812924bd9c2c3a82a.rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
39768453c17afce045164d39f94da00f2e7278130702d41812924bd9c2c3a82a.rtf
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://171.22.30.147/cody/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
39768453c17afce045164d39f94da00f2e7278130702d41812924bd9c2c3a82a.doc
-
Size
41KB
-
MD5
28c91c3972300ec87144051e544ed45e
-
SHA1
0b3c7fa689cc170eb46d6403c4e4f832646b9280
-
SHA256
39768453c17afce045164d39f94da00f2e7278130702d41812924bd9c2c3a82a
-
SHA512
214831419b83a4820b1334eb3da2443a4a0fac02f50c17c9db08510f06be57a7a18b761de9fc117c3c7ef579655ff57438ae48aaa69fd971f2299cd7916eeb72
-
SSDEEP
768:cFx0XaIsnPRIa4fwJMeOwtqisMbMU9YjR7/FAIBixw0dp821Dhoqg71:cf0Xvx3EM/YTCV/FTBixwOpnoqgR
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-