General
-
Target
PO890299700006.xlsx
-
Size
1.6MB
-
Sample
210112-6kpcxszje2
-
MD5
2103ff7e24639940bd798329f87cc01b
-
SHA1
4791c53bc2f80cc3a57e21d02af58acad7be6bd4
-
SHA256
6f5b5a509984fec1db8a161cb82c74ead7bcdd7fb2f683e3a7c0ed69c70c69b6
-
SHA512
56c5f5685de78321e67758d60184fabd47e768a37e0f78e90a13823ca61bf71517608c55d073a960f9b2e3bd726fba073ed30a427a164941bee91ab0ea26a7ad
Static task
static1
Behavioral task
behavioral1
Sample
PO890299700006.xlsx
Resource
win7v20201028
Behavioral task
behavioral2
Sample
PO890299700006.xlsx
Resource
win10v20201028
Malware Config
Extracted
formbook
http://www.bodyfuelrtd.com/8rg4/
fakecostasunglasses.com
twinbrothers.pizza
jizhoujsp.com
qscrit.com
hotelmanise.com
fer-ua.online
europserver-simcloud.systems
redwap2.pro
betwalkoffame.com
latashalovemillionaire.com
8million-lr.com
tomatrader.com
modaluxcutabovefitness.com
shishijiazu.com
cckytx.com
reversehomeloansmiami.com
imaginenationnetwork.com
thecyclistshop.com
jorgegiljewelry.com
hlaprotiens.com
biblecourt.com
puzelhome.com
musicbychristina.com
iregentos.info
ephwehemeral.com
qubeeva.com
healingwithkarlee.com
giftasmile2day.com
ondesign03.net
argusproductionsus.com
tootleshook.com
sukien-freefire12.com
windmaske.com
futbolclubbarcelona.soccer
veteransc60.com
steambackpacktrade.info
zingnation.com
myfoodworldcup.com
playitaintso.net
crafteest.com
deutschekorrosionsschutz.net
streamcommunitty.com
gatehess.com
hechoenvegas.net
4037a.com
santanabeautycares.com
100feetpics.com
johnsroadantiques.com
improve-climbing.com
18shuwu.net
amazon-support-recovery.com
vibrarecovery.com
deskdonors.info
triagggroup.com
probysweden.com
helloinward.com
vvardown.com
kicksends.com
alwayadopt.com
modernappsllc.com
itswooby.com
med.vegas
chadwestconsulting.com
africanosworld.com
Targets
-
-
Target
PO890299700006.xlsx
-
Size
1.6MB
-
MD5
2103ff7e24639940bd798329f87cc01b
-
SHA1
4791c53bc2f80cc3a57e21d02af58acad7be6bd4
-
SHA256
6f5b5a509984fec1db8a161cb82c74ead7bcdd7fb2f683e3a7c0ed69c70c69b6
-
SHA512
56c5f5685de78321e67758d60184fabd47e768a37e0f78e90a13823ca61bf71517608c55d073a960f9b2e3bd726fba073ed30a427a164941bee91ab0ea26a7ad
-
Xloader Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-