General
-
Target
Purchase Order.xlsx
-
Size
1.1MB
-
Sample
210721-7te9ezk8na
-
MD5
bd74930ecc1b91cafa74e1b0268650af
-
SHA1
be0328924f2885d5d986896b52a2463c5bbed6f0
-
SHA256
153db12d1016932980a84bdd663e46fe92a7324383cd83d0881715f8c6436764
-
SHA512
d24687ade48c8d400ea257b4f2ad092c149dcb69e6f904f8ae550741e411499f06b314c67f5f8a5d7e60a9f91401e8bc918d533422f34fa613a5caa8a7c73d72
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.xlsx
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Purchase Order.xlsx
Resource
win10v20210408
Malware Config
Extracted
xloader
2.3
http://www.partypacktv.net/a3ea/
yvsgge.com
shooter2.com
ugcfashion.com
deltaefficiencies.com
raidertomb.com
atiempoconguadalupe.com
whmmhh.com
hangar360aircraft.com
toughcookiemasks.store
blindowlch.com
yipo.info
mindsomamove.com
theresalobstahlike.com
nova-select.com
socetegen.com
platinaman.com
datsu-nihon.com
jumpstartinggenius.com
slxplay.com
rightwaysdecor.com
noladecor.club
plantfwddelivery.com
bristolfootcare.com
abrosnm3.com
virtualprepreschool.com
puzzlezen.com
njzhongqiang.com
e-fest-japan.com
uncle-charlie.com
bigehc.com
fod-group.com
desiyanutsanddryfruits.com
winchestercapllc.com
yahechi.online
institutohava.com
einfach-weiss.com
plasomzapparel.com
yalani.com
esdely.com
californiatonashville.com
vancthome.com
ahtycpw.com
massachusettsdroneservices.com
sg-bio.com
incontrolfit.com
huttonandhale.dental
seakbailbonds.com
rellik.xyz
thrivelinez.com
roseymacy.com
myholidaynow.com
deutschemart.com
buscosol.com
heliomobile.com
testenv888.com
badazzrocketry.com
com-loginapp.com
ischooluk.com
a-prime-uaedubaiapartments.zone
regenagfarms.com
moonyena.com
cpcyun.net
nightbroadway.com
ososonwheels.com
Targets
-
-
Target
Purchase Order.xlsx
-
Size
1.1MB
-
MD5
bd74930ecc1b91cafa74e1b0268650af
-
SHA1
be0328924f2885d5d986896b52a2463c5bbed6f0
-
SHA256
153db12d1016932980a84bdd663e46fe92a7324383cd83d0881715f8c6436764
-
SHA512
d24687ade48c8d400ea257b4f2ad092c149dcb69e6f904f8ae550741e411499f06b314c67f5f8a5d7e60a9f91401e8bc918d533422f34fa613a5caa8a7c73d72
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-