General
-
Target
ORDER FB8190311.doc
-
Size
120KB
-
Sample
240522-wtsrmabe2z
-
MD5
237e25bae91107e3eb445afe566378e8
-
SHA1
e1b858a7764277cb94920750cddf5ee3f058caf6
-
SHA256
fc3b18395218068895ed815c742fdb1a2b93daf03d4c768b5ac989d95339fe83
-
SHA512
89a010777adc58e457ca335824b7d3944ef5f62f24016f2fca535fc11724ac305aa619a0536a1cc23a840e565272195857419f994916f0a3ca9821a9abb32986
-
SSDEEP
768:bwAbZSibMX9gRWjtwAbZSibMX9gRWjtwAbZSibMX9gRWjtwAbZSibMX9gRWjgLBg:bwAlRkwAlRkwAlRkwAlRxUpjVoMt9
Static task
static1
Behavioral task
behavioral1
Sample
ORDER FB8190311.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ORDER FB8190311.rtf
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://193.238.153.15/evie1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ORDER FB8190311.doc
-
Size
120KB
-
MD5
237e25bae91107e3eb445afe566378e8
-
SHA1
e1b858a7764277cb94920750cddf5ee3f058caf6
-
SHA256
fc3b18395218068895ed815c742fdb1a2b93daf03d4c768b5ac989d95339fe83
-
SHA512
89a010777adc58e457ca335824b7d3944ef5f62f24016f2fca535fc11724ac305aa619a0536a1cc23a840e565272195857419f994916f0a3ca9821a9abb32986
-
SSDEEP
768:bwAbZSibMX9gRWjtwAbZSibMX9gRWjtwAbZSibMX9gRWjtwAbZSibMX9gRWjgLBg:bwAlRkwAlRkwAlRkwAlRxUpjVoMt9
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-