General
-
Target
14ea26a775bf7cd9c438c726ec846bf9cdce4d76c918ad5ed3774376b0de3619.zip
-
Size
16KB
-
Sample
240710-krrwrszfra
-
MD5
3d8c4b006882d42ba427296daf9b03e7
-
SHA1
4e9dcba70e604b3014f3a482089cc78828ce10e4
-
SHA256
bd27689033fb2448f157078ee6eee6f9d45d8e15852d715acedae72a95201a67
-
SHA512
b68873b99ccb68fdd1fee045551516c5d8ff97866c8813aee13363caf30230548bd4ff6b7419c99fbefebba8b1a523bc84fbd51509a415f01d6b63bd75c8c1d7
-
SSDEEP
384:/xfmoMRCppLJzJghg2vMD/tnRf/kj24aZ4Wr4fdN6XO:/xfYCppLJVgxvW/tnRf/kj24M4AOdNSO
Static task
static1
Behavioral task
behavioral1
Sample
14ea26a775bf7cd9c438c726ec846bf9cdce4d76c918ad5ed3774376b0de3619.rtf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
14ea26a775bf7cd9c438c726ec846bf9cdce4d76c918ad5ed3774376b0de3619.rtf
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://dashboardproducts.info/bally/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
14ea26a775bf7cd9c438c726ec846bf9cdce4d76c918ad5ed3774376b0de3619.rtf
-
Size
63KB
-
MD5
f48645f93407473fccd3d921827b876e
-
SHA1
9d81d6c22da289fc2b04c0f7cef803debccbf72d
-
SHA256
14ea26a775bf7cd9c438c726ec846bf9cdce4d76c918ad5ed3774376b0de3619
-
SHA512
dbf232cf00ad890c4710e1ec80c2c430d5aa7e252aac0b658e527d74eff3b4595ead6f784754aeaaf219b7323a7ee69bcfe06d5a1afaa3720ea44d5aae96cbf0
-
SSDEEP
384:ueebxsoUZWX0ivcXPJd0QUSWXqzTJfF+alifsG+sgnBMdbuOTM:ueixsTwgPJqQUSilhfIshuOTM
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-