General
-
Target
RFQ.xls
-
Size
802KB
-
Sample
230719-g6mntagb88
-
MD5
01d35baefe1ce38feffe07104ddd27d0
-
SHA1
aa59f404015f4cb46fe2e607d2fabde040afefd7
-
SHA256
84750ac6287c0ddb3289f197247bf4cd8e06ff9656e5b7355aa8adf37c28f7db
-
SHA512
9ced1e6c21c7b58ac2ba4416b386f67bca2e163ee05a0eb10fcb6c3c5b41dbd31e39b3e2017627637b7529409d0a7333b0427220b90298897125b273956e03eb
-
SSDEEP
12288:0vOij8V1UXqUu9Vner8VdArmmPwUXnJiRCAbocwV1WP5K8cLnGIOsCUlwGIx:xeu9VxpHpbocwTA5K8c1FlwPx
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.xls
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
RFQ.xls
Resource
win10v2004-20230703-en
Malware Config
Extracted
lokibot
http://171.22.30.147/mous/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
RFQ.xls
-
Size
802KB
-
MD5
01d35baefe1ce38feffe07104ddd27d0
-
SHA1
aa59f404015f4cb46fe2e607d2fabde040afefd7
-
SHA256
84750ac6287c0ddb3289f197247bf4cd8e06ff9656e5b7355aa8adf37c28f7db
-
SHA512
9ced1e6c21c7b58ac2ba4416b386f67bca2e163ee05a0eb10fcb6c3c5b41dbd31e39b3e2017627637b7529409d0a7333b0427220b90298897125b273956e03eb
-
SSDEEP
12288:0vOij8V1UXqUu9Vner8VdArmmPwUXnJiRCAbocwV1WP5K8cLnGIOsCUlwGIx:xeu9VxpHpbocwTA5K8c1FlwPx
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-