General
-
Target
2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81.rtf
-
Size
87KB
-
Sample
240724-btejsazeql
-
MD5
29b3fc11ab9d647ec19d3e02364355b2
-
SHA1
bcacc163004990d917d6402942e3e34609fa33e5
-
SHA256
2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81
-
SHA512
68752b58c102c4816859f4e06a9e676509ffba01cbe2772d5694e76da37f4dcdf74bd62d8ecaa33ed42f773693aaf135ad1b4bd940ae2277a7900f0105c57ba0
-
SSDEEP
768:l5NZ+md7y9LGWjGT56kqg0PDvoszSzJpmSci/Dcohk:l5OpGWKT5Fx0LwFzJoSci/Nhk
Static task
static1
Behavioral task
behavioral1
Sample
2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81.rtf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81.rtf
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://overclockingmachines.info/bally/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81.rtf
-
Size
87KB
-
MD5
29b3fc11ab9d647ec19d3e02364355b2
-
SHA1
bcacc163004990d917d6402942e3e34609fa33e5
-
SHA256
2f7014c598a900f828893aeb0c0724d9f48c37c6987dfc12847525df174e0e81
-
SHA512
68752b58c102c4816859f4e06a9e676509ffba01cbe2772d5694e76da37f4dcdf74bd62d8ecaa33ed42f773693aaf135ad1b4bd940ae2277a7900f0105c57ba0
-
SSDEEP
768:l5NZ+md7y9LGWjGT56kqg0PDvoszSzJpmSci/Dcohk:l5OpGWKT5Fx0LwFzJoSci/Nhk
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-