General
-
Target
zxalphamn.doc
-
Size
711KB
-
Sample
241029-qp6j2awbme
-
MD5
6d073ba5d41c86cae70a88e15da90ac7
-
SHA1
b0c0699759746709a33c5fdfcb10077d4a9f0b3c
-
SHA256
567820aebb552f95bf4346fd52d4b65fa77fb729a5a3d4d997053dc945d60cef
-
SHA512
c02b23ca56aad295d7b18993ea75066ced900bd4be36f449807aa599e93445e4d1d21d9afe875ac54e7d9db068ce5e7093a3862e0df90f61c50765eaa177db17
-
SSDEEP
6144:uwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAbNHohwghDE9frXV0ZtZD2EPd3+hG:dU
Static task
static1
Behavioral task
behavioral1
Sample
zxalphamn.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
zxalphamn.rtf
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://touxzw.ir/alpha2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
zxalphamn.doc
-
Size
711KB
-
MD5
6d073ba5d41c86cae70a88e15da90ac7
-
SHA1
b0c0699759746709a33c5fdfcb10077d4a9f0b3c
-
SHA256
567820aebb552f95bf4346fd52d4b65fa77fb729a5a3d4d997053dc945d60cef
-
SHA512
c02b23ca56aad295d7b18993ea75066ced900bd4be36f449807aa599e93445e4d1d21d9afe875ac54e7d9db068ce5e7093a3862e0df90f61c50765eaa177db17
-
SSDEEP
6144:uwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAbNHohwghDE9frXV0ZtZD2EPd3+hG:dU
-
Lokibot family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-