General
-
Target
GENERALGROUP INV FWDRB42024.doc
-
Size
164KB
-
Sample
240510-jlztraed92
-
MD5
a9c19478afbe4b0cfef5909bfe3ea1f7
-
SHA1
156096e4a1afa49747fd177ebe3bf744103d58cc
-
SHA256
c92a29ffe704fd01df9832b221781fe8cafef9fcd125fb380227571cd94df921
-
SHA512
cdb53484d8f7d1e934ec35c067a30bc8ab40068f197921403cce6ffcdae05e1e3588fc1c57fa155c776338cbb00a54638f39b76ce795152fb66e5da996db11f2
-
SSDEEP
3072:VwAlawAlawAlawAlawAlawAlPmtIwDdVN03czX/:VwAYwAYwAYwAYwAYwArwDdVN6czX/
Static task
static1
Behavioral task
behavioral1
Sample
GENERALGROUP INV FWDRB42024.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GENERALGROUP INV FWDRB42024.rtf
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://195.123.211.210/evie1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
GENERALGROUP INV FWDRB42024.doc
-
Size
164KB
-
MD5
a9c19478afbe4b0cfef5909bfe3ea1f7
-
SHA1
156096e4a1afa49747fd177ebe3bf744103d58cc
-
SHA256
c92a29ffe704fd01df9832b221781fe8cafef9fcd125fb380227571cd94df921
-
SHA512
cdb53484d8f7d1e934ec35c067a30bc8ab40068f197921403cce6ffcdae05e1e3588fc1c57fa155c776338cbb00a54638f39b76ce795152fb66e5da996db11f2
-
SSDEEP
3072:VwAlawAlawAlawAlawAlawAlPmtIwDdVN03czX/:VwAYwAYwAYwAYwAYwArwDdVN6czX/
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-