General
-
Target
DocNo2300058329.doc__.rtf
-
Size
316KB
-
Sample
210502-6mglz9xjns
-
MD5
5e37b9c3ab14d8c2349506fa6be2de0d
-
SHA1
1e5777efbbe88c9f92ec0438eb07d9b7c92ea43d
-
SHA256
1256f793afb38cb63438acdbb6e1e3646eb66d4ecd1c4fe79178702e43311c94
-
SHA512
2eb029a1e719a5312084d0ead75af3276a9bab55a112f71df820fd4f681cdfda7eeabdc8ca1cd124e7c5381b5104bf712117fcf1ca6f4dacc6379970241cddca
Static task
static1
Behavioral task
behavioral1
Sample
DocNo2300058329.doc__.rtf
Resource
win7v20210410
Behavioral task
behavioral2
Sample
DocNo2300058329.doc__.rtf
Resource
win10v20210408
Malware Config
Extracted
xloader
2.3
http://www.jqjdgw.com/ued5/
italiancosmeticbeauty.com
zhima7.com
phresheffect.com
comp-savvy.net
xjhtcaum.com
copperbrassgermkey.com
smero.financial
opticsoptimum.com
pisanosportpraxis.com
pediatricfeedrates.com
binsogleam.com
sarahseatter.com
wywatershed.com
smellyhomeshop.com
naviorchidlife.com
cunerier.com
thecornercomputers.com
brightwoodcollection.com
taxprep-repsolutions.net
phukien4u.net
crezcayemprenda.com
terrasroraima.com
vinkot.com
endthefatblogs.com
nwmicrobefreesolutions.com
chandlerguo.com
pacificedgesunglasses.com
hurrygift.com
felocacasa.com
zoom-sides.com
dovesprinklers.com
caravaggioclothing.com
renchengjixie.com
hfctzdsns.club
sukaa.tech
gurukulmitra.com
thedailyprocrastinator.com
xinxiu.store
woodlanddentalcarefl.com
pyperpay.com
fabularo.com
tvdajiang14.com
ihatesammamish.com
bbluebelttvwdbuy.com
replenish-skin.com
qf577.com
freemoneyfornursingschool.com
lpida.com
schmelzens.com
exuberantemodafeminina.com
babylandclothing.com
designer-dropship.com
sbeconlineacademy.com
homeandcabinwoodsigns.com
cqxiangcida.com
806queen.com
metropolisgrowlers.com
easycremationserviceusa.com
greenpis0n.com
vagasportal.com
hargsgroup.com
hyrerecruiting.com
carlsonwagonlit.sucks
beischabig.com
Targets
-
-
Target
DocNo2300058329.doc__.rtf
-
Size
316KB
-
MD5
5e37b9c3ab14d8c2349506fa6be2de0d
-
SHA1
1e5777efbbe88c9f92ec0438eb07d9b7c92ea43d
-
SHA256
1256f793afb38cb63438acdbb6e1e3646eb66d4ecd1c4fe79178702e43311c94
-
SHA512
2eb029a1e719a5312084d0ead75af3276a9bab55a112f71df820fd4f681cdfda7eeabdc8ca1cd124e7c5381b5104bf712117fcf1ca6f4dacc6379970241cddca
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-