General
-
Target
PurchaseOrder40360414.doc
-
Size
600KB
-
Sample
250326-heygnsywft
-
MD5
62d9f219d4c67d21a6a125597804821b
-
SHA1
48a46d13ff5571ba085cbd4b9f6575a400199d24
-
SHA256
0c10532495658ae6099011796249e76b9ef33235a019df54086bd07547685354
-
SHA512
3296f44e94c842d970de96ccb1c4dc41516f4e7aecd4b5dc22ebfa50238c1f853a169fb90bbfbc8eece44b047987a4bc765f63c263b93deac2eb4162bf274b44
-
SSDEEP
6144:KwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAE:j
Static task
static1
Behavioral task
behavioral1
Sample
PurchaseOrder40360414.rtf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PurchaseOrder40360414.rtf
Resource
win10v2004-20250314-en
Malware Config
Extracted
lokibot
http://94.156.177.41/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PurchaseOrder40360414.doc
-
Size
600KB
-
MD5
62d9f219d4c67d21a6a125597804821b
-
SHA1
48a46d13ff5571ba085cbd4b9f6575a400199d24
-
SHA256
0c10532495658ae6099011796249e76b9ef33235a019df54086bd07547685354
-
SHA512
3296f44e94c842d970de96ccb1c4dc41516f4e7aecd4b5dc22ebfa50238c1f853a169fb90bbfbc8eece44b047987a4bc765f63c263b93deac2eb4162bf274b44
-
SSDEEP
6144:KwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAE:j
-
Lokibot family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Exploitation for Client Execution
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1