General
-
Target
B13 13.doc
-
Size
117KB
-
Sample
231224-jwypfadfa6
-
MD5
d780f729b768267d7b9e13077f409ac6
-
SHA1
fb1d48ae8c1c4f847b9e18ee36973bcfd4a30cab
-
SHA256
b73e179ef77fd186e1a1e4228fff4fda9565ef868e5ef0be35d56d06155dc7b3
-
SHA512
86d394a78d556b26f4e8de26f478aefe36e6eb15c74769d462359a521f8035e6d691a64d6860aca355665d39c9d6f345a05b6861b5fa22d7fa90399878c8abc8
-
SSDEEP
1536:OwAlRkwAlR/yL02d3nmMBTAEe5gQ8Vcml:OwAlawAlhy/dXB+Ee5T8Vxl
Static task
static1
Behavioral task
behavioral1
Sample
B13 13.rtf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
B13 13.rtf
Resource
win10v2004-20231215-en
Malware Config
Extracted
lokibot
https://sempersim.su/b13/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
B13 13.doc
-
Size
117KB
-
MD5
d780f729b768267d7b9e13077f409ac6
-
SHA1
fb1d48ae8c1c4f847b9e18ee36973bcfd4a30cab
-
SHA256
b73e179ef77fd186e1a1e4228fff4fda9565ef868e5ef0be35d56d06155dc7b3
-
SHA512
86d394a78d556b26f4e8de26f478aefe36e6eb15c74769d462359a521f8035e6d691a64d6860aca355665d39c9d6f345a05b6861b5fa22d7fa90399878c8abc8
-
SSDEEP
1536:OwAlRkwAlR/yL02d3nmMBTAEe5gQ8Vcml:OwAlawAlhy/dXB+Ee5T8Vxl
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-