General
-
Target
Payment.xlsx
-
Size
1.9MB
-
Sample
210505-1bzb6cg49s
-
MD5
3812fac8cd9bd9459499c7888db6ec01
-
SHA1
b86b7eec3bf457494c4c091011c681ea28a57c2e
-
SHA256
d77edf575af32f39c003ccc192ba10259ccb94bd9a5e791b4cd56605fe1bde1d
-
SHA512
5453a1f8c870340215b488dcf95e812765de22d3c4f566c387aa2f64998d08467c19522b6ea0fa19567cac022ac5a7ededdef300481967f26fa7457bb6127f42
Static task
static1
Behavioral task
behavioral1
Sample
Payment.xlsx
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Payment.xlsx
Resource
win10v20210408
Malware Config
Extracted
xloader
2.3
http://www.cats16.com/8u3b/
pipienta.com
wisdomfest.net
jenniferreich.com
bigcanoehomesforless.com
kayandbernard.com
offerbuildingsecrets.com
benleefoto.com
contactlesssoftware.tech
statenislandplumbing.info
lifestylemedicineservices.com
blazerplanning.com
fnatic-skins.club
effectivemarketinginc.com
babyshopit.com
2000deal.com
k12paymentcemter.com
spwakd.com
lesreponses.com
abundando.com
hawkspremierfhc.com
midwestmadeclothing.com
kamuakuinisiapa.com
swirlingheadjewelry.com
donelys.com
stiloksero.com
hoangphucsolar.com
gb-contracting.com
girlboyfriends.com
decadejam.com
glassfullcoffee.com
todoparaconstruccion.com
anygivenrunday.com
newgalaxyindia.com
dahlonegaforless.com
blue-light.tech
web-evo.com
armmotive.com
mollysmulligan.com
penislandbrewer.com
wgrimao.com
dxm-int.net
sarmaayagroup.com
timbraunmusician.com
amazoncovid19tracer.com
peaknband.com
pyqxlz.com
palomachurch.com
surfboardwarehouse.net
burundiacademyst.com
pltcoin.com
workinglifestyle.com
vickybowskill.com
ottawahomevalues.info
jtrainterrain.com
francescoiocca.com
metallitypiercing.com
lashsavings.com
discjockeydelraybeach.com
indicraftsvilla.com
tbq.xyz
arfjkacsgatfzbazpdth.com
appsend.online
cunerier.com
orospucocuguatmaca.com
Targets
-
-
Target
Payment.xlsx
-
Size
1.9MB
-
MD5
3812fac8cd9bd9459499c7888db6ec01
-
SHA1
b86b7eec3bf457494c4c091011c681ea28a57c2e
-
SHA256
d77edf575af32f39c003ccc192ba10259ccb94bd9a5e791b4cd56605fe1bde1d
-
SHA512
5453a1f8c870340215b488dcf95e812765de22d3c4f566c387aa2f64998d08467c19522b6ea0fa19567cac022ac5a7ededdef300481967f26fa7457bb6127f42
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-