General
-
Target
AlezaMED.xls
-
Size
987KB
-
Sample
230530-h3thmagc9y
-
MD5
7cd6ff5343536a27080cf3125f1174ce
-
SHA1
da0d9a92c6a097e5b70fb9e8d680c212321ffa2a
-
SHA256
03d09bfd57e767cf1f87a74717297de4a48ed8ceec42ef6f77d1968dd9fc2df2
-
SHA512
de375ab60ab0d361adffca59ca807eb046fb0c76dd5872986ce92b74ffe7c9d3264adbaf8e843c344e32d31f6771c91721a8b70187704a3d80dbac54d0b45165
-
SSDEEP
12288:6h+ju8dTjV5FlT4Tl1BIxV5GixgBe2WFL+qlzL33WWRrNi+Q3pSjIi7:6hud//QT6xr36eJ0qV33WWTZIS
Behavioral task
behavioral1
Sample
AlezaMED.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
AlezaMED.xls
Resource
win10v2004-20230220-en
Malware Config
Extracted
lokibot
http://146.19.233.219/trip/rx/pin.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
AlezaMED.xls
-
Size
987KB
-
MD5
7cd6ff5343536a27080cf3125f1174ce
-
SHA1
da0d9a92c6a097e5b70fb9e8d680c212321ffa2a
-
SHA256
03d09bfd57e767cf1f87a74717297de4a48ed8ceec42ef6f77d1968dd9fc2df2
-
SHA512
de375ab60ab0d361adffca59ca807eb046fb0c76dd5872986ce92b74ffe7c9d3264adbaf8e843c344e32d31f6771c91721a8b70187704a3d80dbac54d0b45165
-
SSDEEP
12288:6h+ju8dTjV5FlT4Tl1BIxV5GixgBe2WFL+qlzL33WWRrNi+Q3pSjIi7:6hud//QT6xr36eJ0qV33WWTZIS
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-