General
-
Target
Revised PI.doc
-
Size
128KB
-
Sample
240509-m8v1vsec6z
-
MD5
5547cd9535d021cb5ef483cecd1fd9b3
-
SHA1
58fc0256dac27e2cfd6722e5fa72f2a2da3d84f2
-
SHA256
1a3dfef25d4dd44ceaf919901ff26a75b04661c9b8397840688432afa271872f
-
SHA512
62758f616441155552105a4605f573bbc08a88cde14ca48d361ba5695d44959a4a73a3111839dae3a5a43fced2e2ebd25587c51aef37f506e22cd2fc07f064d5
-
SSDEEP
1536:CwAlRkwAlRkwAlRkwAlRkwAlR2j+KOsbemZmGaT:CwAlawAlawAlawAlawAlwa5sbemZmGaT
Static task
static1
Behavioral task
behavioral1
Sample
Revised PI.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Revised PI.rtf
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://rocheholding.top/evie3/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Revised PI.doc
-
Size
128KB
-
MD5
5547cd9535d021cb5ef483cecd1fd9b3
-
SHA1
58fc0256dac27e2cfd6722e5fa72f2a2da3d84f2
-
SHA256
1a3dfef25d4dd44ceaf919901ff26a75b04661c9b8397840688432afa271872f
-
SHA512
62758f616441155552105a4605f573bbc08a88cde14ca48d361ba5695d44959a4a73a3111839dae3a5a43fced2e2ebd25587c51aef37f506e22cd2fc07f064d5
-
SSDEEP
1536:CwAlRkwAlRkwAlRkwAlRkwAlR2j+KOsbemZmGaT:CwAlawAlawAlawAlawAlwa5sbemZmGaT
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-