General
-
Target
Purchase order.xls
-
Size
1.0MB
-
Sample
230208-w9hatsec92
-
MD5
c017f228fc0c09dc33d9d4d0a243cc67
-
SHA1
f5504e64370bb5d8d70b4796a1d92ff3819f768c
-
SHA256
cdca5bbacc8ca195d929b58cffa8b459ec3b585d60c0d41537e97b78b4f65916
-
SHA512
bd3157f8a38b8559ea1a568d1ed1d7fbbc5d7e435e67dd265bdf16eef9ba891d1ae3ec6c4a8e72bde9e726f2a4133aeb87a984dfc47070c1586c79f8664207ab
-
SSDEEP
24576:ZFeuPHAEezjXUcvFeeL7tSCRRFYQ53pGDe5HX:rPPHO4cNNPICrqQ1pGDexX
Behavioral task
behavioral1
Sample
Purchase order.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Purchase order.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha9/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Purchase order.xls
-
Size
1.0MB
-
MD5
c017f228fc0c09dc33d9d4d0a243cc67
-
SHA1
f5504e64370bb5d8d70b4796a1d92ff3819f768c
-
SHA256
cdca5bbacc8ca195d929b58cffa8b459ec3b585d60c0d41537e97b78b4f65916
-
SHA512
bd3157f8a38b8559ea1a568d1ed1d7fbbc5d7e435e67dd265bdf16eef9ba891d1ae3ec6c4a8e72bde9e726f2a4133aeb87a984dfc47070c1586c79f8664207ab
-
SSDEEP
24576:ZFeuPHAEezjXUcvFeeL7tSCRRFYQ53pGDe5HX:rPPHO4cNNPICrqQ1pGDexX
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-