General
-
Target
ARRIVAL NOTICE.doc
-
Size
155KB
-
Sample
240521-qlacesfd4s
-
MD5
f0b81727aaae72dd97b0420c46427ac2
-
SHA1
ae2806f7a923214a0e82f7a788f14a269a236315
-
SHA256
309fa7a49ec515910ccb0d8432e1bcc2bb7d9f8c252230177236e0a028488377
-
SHA512
c2c5ecc676b37699b23145b76b86628e5a61f810b8122917781d7112b56e58440a148b441e1bf28d083f33be59764a3106984a88a50410a0f034610743a2284b
-
SSDEEP
1536:ywAlRkwAlRkwAlRkwAlRwA96EHr0iQZpfNE:ywAlawAlawAlawAl6A96XiQDfNE
Static task
static1
Behavioral task
behavioral1
Sample
ARRIVAL NOTICE.rtf
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ARRIVAL NOTICE.rtf
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://spencerstuartllc.top/evie2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ARRIVAL NOTICE.doc
-
Size
155KB
-
MD5
f0b81727aaae72dd97b0420c46427ac2
-
SHA1
ae2806f7a923214a0e82f7a788f14a269a236315
-
SHA256
309fa7a49ec515910ccb0d8432e1bcc2bb7d9f8c252230177236e0a028488377
-
SHA512
c2c5ecc676b37699b23145b76b86628e5a61f810b8122917781d7112b56e58440a148b441e1bf28d083f33be59764a3106984a88a50410a0f034610743a2284b
-
SSDEEP
1536:ywAlRkwAlRkwAlRkwAlRwA96EHr0iQZpfNE:ywAlawAlawAlawAl6A96XiQDfNE
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-