General
-
Target
REMITTANCE ADVICE [REF0000360261]_PDF.xlsx
-
Size
2.3MB
-
Sample
210120-hp3wadfjya
-
MD5
43b96385258acf475e9bcfa298296114
-
SHA1
94a26c83395d7e51fd9e8d5b5842708d96b4b9df
-
SHA256
136adc85cb6e108bb2b15af54afdce83ee2affad76c0a669c7c8e9ff10dc86aa
-
SHA512
53087749e9b6eda791a66e1ceea94ed5375ab816b839ef0460c37be4e16a98d86e2452853862d727a340096855a89d3b17d8dc5ccc2482f5fadae363006c7b47
Static task
static1
Behavioral task
behavioral1
Sample
REMITTANCE ADVICE [REF0000360261]_PDF.xlsx
Resource
win7v20201028
Behavioral task
behavioral2
Sample
REMITTANCE ADVICE [REF0000360261]_PDF.xlsx
Resource
win10v20201028
Malware Config
Extracted
formbook
http://www.vkreditoff.online/hvu9/
infrapin.com
electrochimp.com
hometuitionteachers.com
cruelworldsupply.com
wesolvit.net
transferypilkarskie.com
nuovavoce.style
secundaria209emilianozapata.com
brewmastersbrigade.com
delraymessageandtherapy.com
trikeua.com
buildelectricwa.info
inspiredbylisamarie.com
keaidoo.com
cahmp.com
cockteesgolf.com
seachakravibe.store
timelesswritersgroup.com
kingdombest.net
metodologiamontessori.com
darkphi.club
fantasypickem.com
zsyj.xyz
maglex.info
pushmetop.com
myaccountantlondon.net
02bytes.com
bootwish.com
hammarhaag.com
elemistlarp.com
christmasballer.com
maskeando.com
saleh-online.com
puzuie.com
dumo8ja-slzc.info
uwatchpro.com
ralph-jones-home-plans.com
elfmadeniyaglari.com
kharismahadi.com
electrumwitged.download
apignamedgertrude.com
peteza-in-france.com
krisoykremelistense.com
nathaliemoser.com
maruzatimvar.com
betwinnertipps.com
mobilefaders.com
fishkill.farm
silkensari.com
clinicemdad.com
plcpathways.net
healthvideogames.com
albaswimwear.com
vegetarian-restaurants.com
giangiaovietform.com
septemberlove.net
electronicworkers.com
icredit3000.com
mysidewalkshops.com
chawapp.com
airbersihfakfak.com
broadwaybar.net
carlettascottisreal.com
eventsbyelizabethjones.com
Targets
-
-
Target
REMITTANCE ADVICE [REF0000360261]_PDF.xlsx
-
Size
2.3MB
-
MD5
43b96385258acf475e9bcfa298296114
-
SHA1
94a26c83395d7e51fd9e8d5b5842708d96b4b9df
-
SHA256
136adc85cb6e108bb2b15af54afdce83ee2affad76c0a669c7c8e9ff10dc86aa
-
SHA512
53087749e9b6eda791a66e1ceea94ed5375ab816b839ef0460c37be4e16a98d86e2452853862d727a340096855a89d3b17d8dc5ccc2482f5fadae363006c7b47
-
Xloader Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-