General
-
Target
PI_55034455.xlsx
-
Size
1.3MB
-
Sample
210826-5qwsedsh12
-
MD5
b677902aa5e2126451dc6258e35d99f5
-
SHA1
2325d8d4c12de4fcd6b29c152cf4017983730198
-
SHA256
4b2e04f07ddbbc25db9260eac2de0d8ce45488b3a2c80de9c384b1abb014bbbd
-
SHA512
e7b2fb8dad97742f85aa935bcde585d1876c79600804f969c8667c2011250b194fb3dc2b505d444a8210590182b2213ace2c09e5fed7f9e370d955796f0fd8d8
Static task
static1
Behavioral task
behavioral1
Sample
PI_55034455.xlsx
Resource
win7v20210410
Behavioral task
behavioral2
Sample
PI_55034455.xlsx
Resource
win10v20210410
Malware Config
Extracted
xloader
2.3
ecuu
http://www.polaritelibrairie.com/ecuu/
buoy8boats.com
tomrings.com
o-distribs.com
majesticgroupinc.com
tehridam.com
yzwjtoys.com
castro-online.run
aquarius-twins.com
jamesrrossfineart.com
pavarasupatthonkol.com
rivermarketdentistry.com
gyiblrjd.icu
redcountrypodcast.com
youngbrotherspharmacyga.com
betsysobiech.com
neocleanpro.com
ingpatrimoine.com
mustangsallytransportation.com
jsvfcxzn.com
krsfpjuoekcd.info
cricutcutfiles.club
fjucurta.com
soberrituals.com
mercamoderna.com
empirerack.com
poorwhitetrashlivesmatter.net
the-boardroom-usa.com
boldgroupghana.com
stathotshots.com
workabhaile.com
drgigadvisors.com
tfqvslhlh.club
meo6.com
myreti.com
tasteofourneighborhood.com
manufacturedinjapan.com
listenstech.com
jdcloud-neucampus.com
westgateoptometry.store
sourcefirstconsulting.com
xmasmobitvbuy.com
blackhillsfarmtn.com
georgiaforless.com
enovexcorp.com
nxtelligence.com
emotionalgangster.com
chainsawsparts.com
dplqyz.com
lossaboresdemama.com
805thaifood.com
safeandsoundyachtservices.com
grandparentsandkids.com
catalystdentalallies.com
keplersark.com
desrefuses.com
comerciolimited.com
cotonslife.com
pegasusf.xyz
rocketmortgagedeceit.com
mypartydelivered.com
gvassummit2020.com
thefamilybubble.com
lgjccz.com
donnaquerns.com
Targets
-
-
Target
PI_55034455.xlsx
-
Size
1.3MB
-
MD5
b677902aa5e2126451dc6258e35d99f5
-
SHA1
2325d8d4c12de4fcd6b29c152cf4017983730198
-
SHA256
4b2e04f07ddbbc25db9260eac2de0d8ce45488b3a2c80de9c384b1abb014bbbd
-
SHA512
e7b2fb8dad97742f85aa935bcde585d1876c79600804f969c8667c2011250b194fb3dc2b505d444a8210590182b2213ace2c09e5fed7f9e370d955796f0fd8d8
Score10/10-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-