General
-
Target
7874cf4190f58638d9950fe8d450ac98a03dd4bac70bcc43edc4ab3f482a6765.rtf
-
Size
162KB
-
Sample
240702-bz74aa1gqe
-
MD5
418c12bd742fe4bc4cf4849870bfc01c
-
SHA1
e0dde1237e149662e691ea7fba799f3d0d3aff1d
-
SHA256
7874cf4190f58638d9950fe8d450ac98a03dd4bac70bcc43edc4ab3f482a6765
-
SHA512
a7986e1c240ad2cd60a74aa78f8e692fb06a8ba4d2a1f94427794230ea1a126e806ee72d190920b90dd5542d984f22f9aae80aff9add3f73669bbc5f565ef362
-
SSDEEP
3072:8gGZmQDSgQn8/gOUuKdw9KDETVTwiPswb1K1BP1SqLj:8gGZmMSgQnpTZW9KDETVThb1yBPsq3
Static task
static1
Behavioral task
behavioral1
Sample
7874cf4190f58638d9950fe8d450ac98a03dd4bac70bcc43edc4ab3f482a6765.rtf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7874cf4190f58638d9950fe8d450ac98a03dd4bac70bcc43edc4ab3f482a6765.rtf
Resource
win10v2004-20240611-en
Malware Config
Extracted
lokibot
http://dashboardproducts.info/bally/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7874cf4190f58638d9950fe8d450ac98a03dd4bac70bcc43edc4ab3f482a6765.rtf
-
Size
162KB
-
MD5
418c12bd742fe4bc4cf4849870bfc01c
-
SHA1
e0dde1237e149662e691ea7fba799f3d0d3aff1d
-
SHA256
7874cf4190f58638d9950fe8d450ac98a03dd4bac70bcc43edc4ab3f482a6765
-
SHA512
a7986e1c240ad2cd60a74aa78f8e692fb06a8ba4d2a1f94427794230ea1a126e806ee72d190920b90dd5542d984f22f9aae80aff9add3f73669bbc5f565ef362
-
SSDEEP
3072:8gGZmQDSgQn8/gOUuKdw9KDETVTwiPswb1K1BP1SqLj:8gGZmMSgQnpTZW9KDETVThb1yBPsq3
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-