General
-
Target
REQUEST FOR QUOTATION 1307-RFQ.pdf.exe
-
Size
1.5MB
-
Sample
210430-467s7jy3ha
-
MD5
c8e023a90c7e5e165f6b16317c822ce4
-
SHA1
27b416606206bc03980dbd83858d33fc188ca926
-
SHA256
13ec453c6271270eaea5be0958c7135ef449bd2ff1e74ad268fe76df32db5d72
-
SHA512
710f7ee5e58c7d7c62241e2419ba9842c1dd892ad7081660da4d514762427d8479ff1aa8cb0c6262514a3710e5a7eff488cab71585e7a3de85ca1346bcd05c05
Static task
static1
Behavioral task
behavioral1
Sample
REQUEST FOR QUOTATION 1307-RFQ.pdf.exe
Resource
win7v20210410
Malware Config
Extracted
xloader
2.3
http://www.huamxvcyq.icu/aepn/
noesos.com
partsus.xyz
manageordercentersupp.com
wickedwallart.com
hike4cash.com
theviragocircle.com
followthesharks.com
paradisevalleywines.com
unmetrolimpio.com
eurocarsnj.com
alvaroeliseo.com
bfc8.xyz
oldcourts.com
bkpef.info
mammately.com
agentcharles.com
wwwmichiganbulb.com
pensolid.info
hibiscushealthcare.com
mwanakbk.com
theafashions.com
fundolagosecreto.com
callusesremover.com
hyprepolymer.com
ferguson-home.com
greenfixfuel.com
nationalseniorsdeerpark.com
laurinwithhoney.com
asiancajundesign.com
ethereumaudit.com
danisco.sucks
avtobluz72.net
maymodel.net
heisenbrew.wine
wirebendersportfishing.com
syncblow.site
littleslumberparties.com
progmao.com
sarl-renov-bat.com
ngoclacntv.com
fand-sodan.com
parkourtrading.com
ladywhitecompany.com
theislamoscope.com
amarresdemas.com
playgymnastics.com
last-information-app-secure.com
myglowskins.com
chain-dynamics.net
mildinfra.com
wwwxilu.com
hunhu.net
inconel800.com
thumuavaigiacao.com
katsworlds.com
jewelsfleet.com
organichighqualitytwig.com
ocheapvrwdmall.com
alsiha2020.com
renttoownhomearizona.com
digitaldustbowl.net
xn----7sbbixkkqgmzjfi.xn--p1acf
downsizeandupsizeyourlife.info
senmec23.com
Targets
-
-
Target
REQUEST FOR QUOTATION 1307-RFQ.pdf.exe
-
Size
1.5MB
-
MD5
c8e023a90c7e5e165f6b16317c822ce4
-
SHA1
27b416606206bc03980dbd83858d33fc188ca926
-
SHA256
13ec453c6271270eaea5be0958c7135ef449bd2ff1e74ad268fe76df32db5d72
-
SHA512
710f7ee5e58c7d7c62241e2419ba9842c1dd892ad7081660da4d514762427d8479ff1aa8cb0c6262514a3710e5a7eff488cab71585e7a3de85ca1346bcd05c05
-
Xloader Payload
-
Suspicious use of SetThreadContext
-