General
-
Target
PO DTL20-041.doc
-
Size
400KB
-
Sample
240513-kc2gnaec7x
-
MD5
e334ed30eb161cd9517431ee26f7df69
-
SHA1
ad0799b76832939a37d223b25da870773659ff2e
-
SHA256
c73fded08a7501a542f197617a30f30ce307fd5190a9f8778478b8ba2586de5b
-
SHA512
3cb096459103041e882b7933159e9145c42d36136489ce61a093ddd8fb208f7199a6fc6635afa1086c6626680cdf913dcc1e2416f93f8aa46bada8c81097c927
-
SSDEEP
6144:8wAYwAYwAYwAYwAYwAYwAYwAYwAYwAa/LABMZSw:ZC
Static task
static1
Behavioral task
behavioral1
Sample
PO DTL20-041.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO DTL20-041.rtf
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://spencerstuartllc.top/evie2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PO DTL20-041.doc
-
Size
400KB
-
MD5
e334ed30eb161cd9517431ee26f7df69
-
SHA1
ad0799b76832939a37d223b25da870773659ff2e
-
SHA256
c73fded08a7501a542f197617a30f30ce307fd5190a9f8778478b8ba2586de5b
-
SHA512
3cb096459103041e882b7933159e9145c42d36136489ce61a093ddd8fb208f7199a6fc6635afa1086c6626680cdf913dcc1e2416f93f8aa46bada8c81097c927
-
SSDEEP
6144:8wAYwAYwAYwAYwAYwAYwAYwAYwAYwAa/LABMZSw:ZC
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-