General
-
Target
f9f9590decd385c9621b42ae433060e0757fa72240a13acbbef801edffcf51eb.rtf
-
Size
92KB
-
Sample
240707-bref1azcpn
-
MD5
b8647e9307cd02f868c77a042f2005a4
-
SHA1
4821b7bf6761b6d6b0d3509993163d257204a839
-
SHA256
f9f9590decd385c9621b42ae433060e0757fa72240a13acbbef801edffcf51eb
-
SHA512
6238695c06e4abbb316e64ae5f2eefbf55efd722266f9d9d293cce27a8367fcf60af0f50ba8f615b2c32348c9a7d682502a6fb9da61f903d1cdaeaf8f485e345
-
SSDEEP
384:56tlpgAJ0Kjn0JjQyQ+y32IS4UuxgyyzMe+YCx8e9f5FI3etS1Ej7kTdVo:0tlpgkjsQF4IFeyyzFnCKwhFbxfAe
Static task
static1
Behavioral task
behavioral1
Sample
f9f9590decd385c9621b42ae433060e0757fa72240a13acbbef801edffcf51eb.rtf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f9f9590decd385c9621b42ae433060e0757fa72240a13acbbef801edffcf51eb.rtf
Resource
win10v2004-20240704-en
Malware Config
Extracted
lokibot
http://dashboardproducts.info/bally/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f9f9590decd385c9621b42ae433060e0757fa72240a13acbbef801edffcf51eb.rtf
-
Size
92KB
-
MD5
b8647e9307cd02f868c77a042f2005a4
-
SHA1
4821b7bf6761b6d6b0d3509993163d257204a839
-
SHA256
f9f9590decd385c9621b42ae433060e0757fa72240a13acbbef801edffcf51eb
-
SHA512
6238695c06e4abbb316e64ae5f2eefbf55efd722266f9d9d293cce27a8367fcf60af0f50ba8f615b2c32348c9a7d682502a6fb9da61f903d1cdaeaf8f485e345
-
SSDEEP
384:56tlpgAJ0Kjn0JjQyQ+y32IS4UuxgyyzMe+YCx8e9f5FI3etS1Ej7kTdVo:0tlpgkjsQF4IFeyyzFnCKwhFbxfAe
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-