General
-
Target
SAUDI ARAMCO Tender Documents - BOQ and ITB.xlsx
-
Size
595KB
-
Sample
210830-w5zaslsjae
-
MD5
55215edf1681459ed01b34058840c708
-
SHA1
7e32a82515fff65815e0d4082bd496226aeb4505
-
SHA256
6a6dd01f5e7696fe2d5368bdd78125582f34c1dc4118e6593db34c920f3d1fc7
-
SHA512
66806dcd4ea52cd99d411b635d0604874b91c544fe9b4dd860b3c433eb937405eb39a1066e2745866f706a1b01cd0dc324a0bf8a3ceee7957830ddea26e7d2fd
Static task
static1
Behavioral task
behavioral1
Sample
SAUDI ARAMCO Tender Documents - BOQ and ITB.xlsx
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SAUDI ARAMCO Tender Documents - BOQ and ITB.xlsx
Resource
win10v20210408
Malware Config
Extracted
xloader
2.3
n8ba
http://www.narrowpathwc.com/n8ba/
thefitflect.com
anytourist.com
blggz.xyz
ascope.club
obyeboss.com
braun-mathematik.online
mtsnurulislamsby.com
jwpropertiestn.com
animalds.com
cunerier.com
sillysocklife.com
shopliyonamaaghin.net
theredcymbalsco.com
lostbikeproject.com
ryggoqlmga.club
realestatetriggers.com
luvlauricephotography.com
cheesehome.cloud
5fashionfix.net
wata-6-rwem.net
ominvestment.net
rrinuwsq643do2.xyz
teamtacozzzz.com
newjerseyreosales.com
theresahovo.com
wowmovies.today
77k6tgikpbs39.net
americagoldenwheels.com
digitaladbasket.com
gcagame.com
arielatkins.net
2020coaches.com
effthisshit.com
nycabl.com
fbvanminh.com
lovebirdsgifts.com
anxietyxpill.com
recaptcha-lnc.com
aprendelspr.com
expatinsur.com
backtothesimplethings.com
pcf-it.services
wintonplaceoh.com
designermotherhood.com
naamt.com
lifestylebykendra.com
thehighstatusemporium.com
oneninelacrosse.com
mariasmoworldwide.com
kitesurf-piraten.net
atelierbond.com
mynjelderlaw.com
moucopia.com
hauhome.club
imroundtable.com
thralink.com
baoequities.com
nassy.cloud
goldenstatelabradoodles.com
revenueremedyintensive.com
dfendglobal.com
pugliaandgastronomy.com
cypios.net
trinioware.com
Targets
-
-
Target
SAUDI ARAMCO Tender Documents - BOQ and ITB.xlsx
-
Size
595KB
-
MD5
55215edf1681459ed01b34058840c708
-
SHA1
7e32a82515fff65815e0d4082bd496226aeb4505
-
SHA256
6a6dd01f5e7696fe2d5368bdd78125582f34c1dc4118e6593db34c920f3d1fc7
-
SHA512
66806dcd4ea52cd99d411b635d0604874b91c544fe9b4dd860b3c433eb937405eb39a1066e2745866f706a1b01cd0dc324a0bf8a3ceee7957830ddea26e7d2fd
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-