General
-
Target
REMITTANCE ADVICE [REF0000360261].xls
-
Size
1.0MB
-
Sample
230209-aake9abe56
-
MD5
9440bad2a57747bf88aa508e26485ddc
-
SHA1
a3242607f6570536eafda3b6f4d3f30da560e2f5
-
SHA256
83b5e2491136b593198de29997b791e88e7d5a3e6472caae44902191e6266e52
-
SHA512
1fd31386fad6eedbffe869a05552741a9bacbb237e8ca5e66b8c309320011925fc7a7ec57cf27df38b3d3535e8ca3e8e85510d262605c104166f57dac8dd79ce
-
SSDEEP
24576:bFefqLFRIcBFe3MdGoo5ncQVSyjAcZDek:5lpzGEtQV9fll
Behavioral task
behavioral1
Sample
REMITTANCE ADVICE [REF0000360261].xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
REMITTANCE ADVICE [REF0000360261].xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha13/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
REMITTANCE ADVICE [REF0000360261].xls
-
Size
1.0MB
-
MD5
9440bad2a57747bf88aa508e26485ddc
-
SHA1
a3242607f6570536eafda3b6f4d3f30da560e2f5
-
SHA256
83b5e2491136b593198de29997b791e88e7d5a3e6472caae44902191e6266e52
-
SHA512
1fd31386fad6eedbffe869a05552741a9bacbb237e8ca5e66b8c309320011925fc7a7ec57cf27df38b3d3535e8ca3e8e85510d262605c104166f57dac8dd79ce
-
SSDEEP
24576:bFefqLFRIcBFe3MdGoo5ncQVSyjAcZDek:5lpzGEtQV9fll
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-