General
-
Target
questionnaire form.doc
-
Size
130KB
-
Sample
240514-ghvdradc27
-
MD5
ce038e37957dceae2606bd0a639b3254
-
SHA1
b642235d1e7817992f4cb49d032ee3768f4a98c4
-
SHA256
b4d1da52a264e0e03f795a00bdc2d7827c1f4345d5d60f4d2e651569a47967b1
-
SHA512
e3b7d54551a549d78cea14356ab07ec70fd0eb5273817725bb2d068b7378ef61b544e87875ecc8e5be43bb4772d91eb10f0e9afd8f811b27b9c2fa241570038e
-
SSDEEP
1536:lwAlRkwAlRkwAlRkwAlRIiHvXA57LiSIdmjSW:lwAlawAlawAlawAlTA57udkSW
Static task
static1
Behavioral task
behavioral1
Sample
questionnaire form.rtf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
questionnaire form.rtf
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://rocheholding.top/evie3/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
questionnaire form.doc
-
Size
130KB
-
MD5
ce038e37957dceae2606bd0a639b3254
-
SHA1
b642235d1e7817992f4cb49d032ee3768f4a98c4
-
SHA256
b4d1da52a264e0e03f795a00bdc2d7827c1f4345d5d60f4d2e651569a47967b1
-
SHA512
e3b7d54551a549d78cea14356ab07ec70fd0eb5273817725bb2d068b7378ef61b544e87875ecc8e5be43bb4772d91eb10f0e9afd8f811b27b9c2fa241570038e
-
SSDEEP
1536:lwAlRkwAlRkwAlRkwAlRIiHvXA57LiSIdmjSW:lwAlawAlawAlawAlTA57udkSW
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-